Cyber-enabled fraud was behind 85% of all losses reported to the FBI in 2025 and constituted 45% of the 1,008,597 complaints it's IC3 unit received overall.
Microsoft said it has been alarmed to see how effective Medusa actors are, citing multiple cases where the group can move from initial access to data exfiltration and ransomware deployment within 24 hours.
A vulnerability identified as problematic has been detected in Samsung Mobile Processor Exynos 1380/1480/1580/2400/2500. Affected is the function set_cpu_affinity of the file npu_proto_drv.ast.thread_ref. Performing a manipulation results in null pointer dereference.
This vulnerability is reported as CVE-2025-62815. The attacker must have access to the local network to execute the attack. No exploit exists.
A vulnerability labeled as problematic has been found in Samsung Mobile Processor Exynos up to 2500. Affected by this vulnerability is the function __pilot_parsing_ncp. Executing a manipulation can lead to null pointer dereference.
This vulnerability appears as CVE-2025-62817. The attacker needs to be present on the local network. There is no available exploit.
A vulnerability labeled as critical has been found in Samsung Mobile Processor, Wearable Processor and Modem Exynos up to 9110. Impacted is an unknown function of the component RRC. Executing a manipulation can lead to improper initialization.
The identification of this vulnerability is CVE-2025-57835. The attack needs to be done within the local network. There is no exploit available.
A vulnerability identified as problematic has been detected in PickPlugins Post Grid and Gutenberg Blocks Plugin up to 2.2.93 on WordPress. This affects an unknown function. Performing a manipulation results in cross site scripting.
This vulnerability is identified as CVE-2024-50432. The attack can be initiated remotely. There is not any exploit available.
A vulnerability labeled as problematic has been found in wowDevs Sky Addons for Elementor Plugin up to 2.5.15 on WordPress. This impacts an unknown function. Executing a manipulation can lead to cross site scripting.
This vulnerability is tracked as CVE-2024-50433. The attack can be launched remotely. No exploit exists.
A vulnerability marked as problematic has been reported in AyeCode GeoDirectory Plugin up to 2.3.80 on WordPress. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2024-50437. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in Theme Horse Clean Retina Plugin up to 3.0.6 on WordPress. It has been declared as problematic. This affects an unknown function. Such manipulation leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is uniquely identified as CVE-2024-50436. The attack can be launched remotely. No exploit exists.
A vulnerability was found in Qode Interactive Qode Essential Addons Plugin up to 1.6.3 on WordPress. It has been rated as problematic. This impacts an unknown function. Performing a manipulation results in improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability was named CVE-2024-50457. The attack may be initiated remotely. There is no available exploit.
A vulnerability categorized as problematic has been discovered in Theme Horse NewsCard Plugin up to 1.3 on WordPress. Affected is an unknown function. Executing a manipulation can lead to improper control of filename for include/require statement in php program ('php remote file inclusion').
The identification of this vulnerability is CVE-2024-50434. The attack may be launched remotely. There is no exploit available.
A vulnerability identified as problematic has been detected in Theme Horse Meta News Plugin up to 1.1.7 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is referenced as CVE-2024-50435. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability, which was classified as problematic, has been found in Webangon The Pack Elementor Addons Plugin up to 2.0.9 on WordPress. The affected element is an unknown function. The manipulation leads to relative path traversal.
This vulnerability is documented as CVE-2024-50453. The attack can be initiated remotely. There is not any exploit available.
A vulnerability classified as critical was found in Apple macOS up to 13.6/14.6. This vulnerability affects unknown code. Executing a manipulation can lead to sandbox issue.
This vulnerability is tracked as CVE-2024-44122. The attack is restricted to local execution. No exploit exists.
Upgrading the affected component is advised.
A vulnerability labeled as critical has been found in Apple macOS. This affects an unknown function of the component Keyboard Input Handler. The manipulation results in permission issues.
This vulnerability is known as CVE-2024-44123. Attacking locally is a requirement. No exploit is available.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in Apple iOS and iPadOS. This impacts an unknown function of the component Keyboard Input Handler. This manipulation causes permission issues.
This vulnerability is handled as CVE-2024-44123. It is possible to launch the attack on the local host. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Apple macOS up to 13.6/14.6 and classified as critical. The impacted element is an unknown function. Performing a manipulation results in sandbox issue.
This vulnerability is identified as CVE-2024-40855. The attack is only possible with local access. There is not any exploit available.
The affected component should be upgraded.