Aggregator
CVE-2025-53080 | Samsung Electronics Data Management Server prior 2.3.13.1/2.6.14.1/2.9.3.6 path traversal
CVE-2025-53649 | SwitchBot App up to 9.12 on iOS/Android User Information log file
CVE-2025-53078 | Samsung Electronics Data Management Server prior 2.3.13.1/2.6.14.1/2.9.3.6 deserialization
CVE-2025-53079 | Samsung Electronics Data Management Server prior 2.3.13.1/2.6.14.1/2.9.3.6 absolute path traversal
Sealed Chain of Deception: Actors leveraging Node.JS to Launch JSCeal
Key Points Introduction Following our VIEW8 publication, an open source tool for analysis of Compiled JavaScript files (JSC), we are continuously tracking the usage of such files by threat actors. Among the threats we identified, a significant campaign caught our attention, which we call JSCEAL. The campaign, which impersonates common crypto trading apps, has been active since […]
The post Sealed Chain of Deception: Actors leveraging Node.JS to Launch JSCeal appeared first on Check Point Research.
CVE-2025-4600 | Google Cloud Classic Application Load Balancer request smuggling (gcp-2025-027 / EUVD-2025-15449)
Возможно ли отключить свет, вентиляцию и пожарную защиту одним эксплойтом? Запросто. И мир к этому не готов
Critical CodeIgniter Flaw Exposes Millions of Web Apps to File Upload Attacks
A critical security vulnerability in CodeIgniter4’s ImageMagick handler has been discovered that could allow attackers to execute arbitrary commands on affected web applications through malicious file uploads. The vulnerability, tracked as CVE-2025-54418, has been assigned a maximum CVSS score of 10.0, indicating its severe nature and potential for widespread exploitation. Vulnerability Overview and Attack Vectors […]
The post Critical CodeIgniter Flaw Exposes Millions of Web Apps to File Upload Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Fighting AI with AI: How Darwinium is reshaping fraud defense
AI agents are showing up in more parts of the customer journey, from product discovery to checkout. And fraudsters are also putting them to work, often with alarming success. In response, cyberfraud prevention leader Darwinium is launching two AI-powered features, Beagle and Copilot, that simulate adversarial behavior and help security teams stay ahead of threats. Announced just ahead of Black Hat USA 2025, these features are designed to give defenders their own AI capabilities. Beagle … More →
The post Fighting AI with AI: How Darwinium is reshaping fraud defense appeared first on Help Net Security.
Alert Fatigue and Talent Gaps Fuel AppSec Weaknesses
The current status of AppSec presents a significant challenge for many organizations in improving their application security.
The post Alert Fatigue and Talent Gaps Fuel AppSec Weaknesses appeared first on Security Boulevard.
SquareX Discloses Architectural Limitations of Browser DevTools in Debugging Malicious Extensions
Darwinium launches AI tools to detect and disrupt adversarial threats
Just ahead of Black Hat USA 2025, Darwinium has announced the launched Beagle and Copilot, two new agentic AI features that simulate adversarial attacks, surface hidden vulnerabilities, and dynamically optimize fraud defenses. As fraudsters increasingly deploy AI agents to evade detection and manipulate digital systems, Darwinium gives defenders their own autonomous AI capabilities, built natively into its behavioral intelligence platform. “Consumers are using AI agents to shop faster. Fraudsters are using them to bypass defenses … More →
The post Darwinium launches AI tools to detect and disrupt adversarial threats appeared first on Help Net Security.
Supply Chain Attacks Spotted in GitHub Actions, Gravity Forms, npm
Identity is the New Perimeter: Why Your IdP Isn’t Enough
In a cloud-first world, identity is one of the most critical layers of security. While organizations are making progress using IdPs, major identity protection gaps remain.
The rise of Identity Providers (IdPs) like Okta, Microsoft Entra ID and Google Cloud Identity has helped organizations centralize and strengthen human identity authentication. Strategic practices like multi-factor authentication (MFA), single sign-on (SSO) and policy enforcement are making IdPs a cornerstone of workforce access control.
According to the Tenable Cloud Security Risk Report 2025, 83% of organizations using Amazon Web Services (AWS) have configured at least one IdP — showing a move to greater maturity in identity practices. An IdP focuses on authentication and authorization – verifying identities and enforcing who can access what systems and under what conditions.
While the use of IdPs is a good step, organizations are still exposed to toxic identity risks that such tools don’t sufficiently cover. IdPs offer limited visibility into how identities behave within — and across — cloud environments, particularly when it comes to advanced identity threats like privilege escalation and lateral movement. Relying solely on an IdP creates critical blind spots. Here’s what you need to know — and how Tenable Cloud Security closes these identity security gaps.
The gaps your IdP doesn’t cover1. Excessive permissionsThe challenge: Developers often grant broad permissions to IAM roles or service accounts — such as s3:*, iam:*, ec2:*. These defaults are rarely audited or reduced later.
Why it’s dangerous: A compromise of one overly-permissioned identity can enable an attacker to gain excessive access — potentially escalating into full environmental takeover.
How Tenable Cloud Security can help:
- Integrates cloud infrastructure entitlement management (CIEM) to map actual, effective permissions across your environment.
- Automatically identifies over-permissioned and inactive identities
- Recommends least-privilege policies based on real-world usage — not guesswork.
- Enables Just in Time (JIT) access to reduce standing permissions to cloud resources and SaaS applications and improve auditability.
- Based on real-world usage.
The challenge: Service accounts and identity and access management (IAM) roles often persist long after their purpose ends. They remain active, unused — and unmonitored.
Why it’s dangerous: Attackers love dormant credentials. They’re rarely rotated, never expire and can silently unlock production environments.
How Tenable Cloud Security can help:
- Continuously audits identity usage across Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure and Oracle Cloud.
- Flags and allows deactivation of unused identities based on 30, 60 or 90+ days of inactivity.
- Provides real-time visibility for eliminating these silent attack paths before attackers find them.
The challenge: IAM trust policies define who can assume what roles. But, too often, they're broadly written: "Allow any principal in this account."
Why it’s dangerous: These misconfigurations can enable privilege escalation, lateral movement or role hijacking — especially in cross-account scenarios.
How Tenable Cloud Security can help:
- Parses IAM trust policies and flags overly permissive configurations.
- Correlates identity trust with associated network exposure to show real attack paths, not just theoretical misconfigurations.
- Helps your team lock down role assumptions before they’re exploited.
While IdPs play a vital role in access control, they only cover one part of your identity landscape. Tenable Cloud Security delivers deep, cloud-native identity security that complements — and goes far beyond — your IdP, including:
Continuous discovery and risk mapping:
- Auto-discovers all human and non-human identities across your multicloud environments.
- Maps effective permissions, trust relationships and access blast radius.
- Unifies visibility across AWS, Azure, GCP and Oracle Cloud.
Prioritized risk context
- Correlates infrastructure, identities, vulnerabilities, network, data and AI resources across multi-cloud and, with the Tenable One Exposure Management Platform, hybrid environments
- Surfaces the highest-priority risks.
- Doesn’t just show you what’s wrong — shows the context for why it matters and how to fix it fast.
Least privilege with CIEM – and JIT access
- Enforces least privilege at scale with automated, CIEM-driven policy recommendations.
- Make least privilege more granular with timebound, JIT access.
- Integrates IAM hygiene into DevSecOps workflows to prevent permissions drift over time.
IdPs are necessary — but not sufficient. Attackers are chaining identity misconfigurations with network exposure and unpatched CVEs to move laterally within an organization. Your IdP may be helping guard against initial access but a serious security battle is being fought deep inside your cloud environment — between workloads, data pipelines and service identities.
With Tenable Cloud Security and Tenable One you can see and secure the full identity picture and tie it all into your broader cloud exposure management strategy.
➡️ Download the Tenable Cloud Security Risk Report 2025
➡️ View our on-demand research webinar
➡️ Read the previous blog in this series: The Toxic Cloud Trilogy: Why Your Workloads Are a Ticking Time Bomb
Don't stop at securing logins. Secure every identity. With Tenable Cloud Security, identity becomes your strongest control — not your weakest link.
PyPI Warns of New Phishing Attack Targeting Developers With Fake PyPI Site
The Python Package Index (PyPI) has issued an urgent warning to developers about an ongoing phishing campaign that exploits domain spoofing techniques to steal user credentials. This sophisticated attack targets developers who have published packages on the official repository, leveraging their trust in the PyPI ecosystem to harvest login credentials through a carefully crafted fake […]
The post PyPI Warns of New Phishing Attack Targeting Developers With Fake PyPI Site appeared first on Cyber Security News.