Aggregator
CVE-2025-45406 | CodeIgniter4 4.6.0 debugbar_time cross site scripting (EUVD-2025-22731)
UNC3886 Actors Know for Exploiting 0-Days Attacking Singapore’s Critical Infrastructure
Singapore’s critical infrastructure faces an escalating cyber threat from UNC3886, a sophisticated Chinese state-linked Advanced Persistent Threat (APT) group that has been systematically targeting the nation’s energy, water, telecommunications, finance, and government sectors. The group, which first emerged circa 2021 and was formally identified by Mandiant in 2022, represents one of the most technically advanced […]
The post UNC3886 Actors Know for Exploiting 0-Days Attacking Singapore’s Critical Infrastructure appeared first on Cyber Security News.
Orange, France’s largest telecoms company, hit by cyberattack
Gemini CLI Vulnerability Allows Silent Execution of Malicious Commands on Developer Systems
Security researchers at Tracebit have discovered a critical vulnerability in Google’s Gemini CLI that enables attackers to silently execute malicious commands on developers’ systems through a sophisticated combination of prompt injection, improper validation, and misleading user interface design. The vulnerability, classified as a P1/S1 issue by Google’s security team, has been patched in the latest […]
The post Gemini CLI Vulnerability Allows Silent Execution of Malicious Commands on Developer Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-52880 | Insyde InsydeH2O up to 05.70.49 VariableRuntimeDxe Driver denial of service
CVE-2025-7810 | StreamWeasels Kick Integration Plugin up to 1.1.4 on WordPress cross site scripting (EUVD-2025-22970)
CVE-2025-7809 | StreamWeasels Twitch Integration Plugin up to 1.9.3 on WordPress cross site scripting (EUVD-2025-22969)
CVE-2025-7811 | StreamWeasels YouTube Integration Plugin up to 1.4.0 on WordPress cross site scripting (EUVD-2025-22968)
CVE-2025-6495 | Bricks Builder Plugin up to 1.12.4 on WordPress sql injection (EUVD-2025-22967)
CVE-2025-4370 | Brizy Plugin up to 2.6.20 on WordPress TXT File store_file authorization (EUVD-2025-22964)
CVE-2025-4566 | Elementor Plugin up to 3.30.2 on WordPress Text Path Widget cross site scripting (EUVD-2025-22965)
CVE-2025-8264 | z-push/z-push-dev up to 2.7.5 Username sql injection (SNYK-PHP-ZPUSHZPUSHDEV-10908180)
CVE-2025-53077 | Samsung Electronics Data Management Server prior 2.3.13.1/2.6.14.1/2.9.3.6 redirect
CVE-2025-53080 | Samsung Electronics Data Management Server prior 2.3.13.1/2.6.14.1/2.9.3.6 path traversal
CVE-2025-53649 | SwitchBot App up to 9.12 on iOS/Android User Information log file
CVE-2025-53078 | Samsung Electronics Data Management Server prior 2.3.13.1/2.6.14.1/2.9.3.6 deserialization
CVE-2025-53079 | Samsung Electronics Data Management Server prior 2.3.13.1/2.6.14.1/2.9.3.6 absolute path traversal
Sealed Chain of Deception: Actors leveraging Node.JS to Launch JSCeal
Key Points Introduction Following our VIEW8 publication, an open source tool for analysis of Compiled JavaScript files (JSC), we are continuously tracking the usage of such files by threat actors. Among the threats we identified, a significant campaign caught our attention, which we call JSCEAL. The campaign, which impersonates common crypto trading apps, has been active since […]
The post Sealed Chain of Deception: Actors leveraging Node.JS to Launch JSCeal appeared first on Check Point Research.