Aggregator
CVE-2010-2129 | Harmistechnology Com Jeajaxeventcalendar 1.0.3 index.php view path traversal (EDB-12598 / XFDB-58602)
Kasada and Vercel Launch BotID: Invisible Bot Protection, Built for Developers
Now millions of developers can easily and effectively protect high-value app flows like login and checkout from bot-driven fraud, without CAPTCHAs
The post Kasada and Vercel Launch BotID: Invisible Bot Protection, Built for Developers appeared first on Security Boulevard.
Beware of Weaponized Wedding Invite Scams That Deploys SpyMax RAT on Android Devices
A sophisticated Android phishing campaign has emerged across India, exploiting the cultural significance of wedding invitations to distribute malicious software. The attack, dubbed “Wedding Invitation,” leverages the ubiquitous nature of digital communication platforms to target unsuspecting mobile users through carefully crafted social engineering tactics. The malware campaign operates through popular messaging platforms including WhatsApp and […]
The post Beware of Weaponized Wedding Invite Scams That Deploys SpyMax RAT on Android Devices appeared first on Cyber Security News.
CVE-2023-38162 | Microsoft Windows DHCP Server Service denial of service (EUVD-2023-41987)
CVE-2025-6613 | PHPGurukul Hospital Management System 4.0 manage-patient.php Name cross site scripting (EUVD-2025-19093)
CVE-2025-6605 | SourceCodester Best Salon Management System 1.0 /panel/edit-staff.php editid sql injection (EUVD-2025-19090)
CVE-2025-6606 | SourceCodester Best Salon Management System 1.0 /panel/add-services.php Type sql injection (EUVD-2025-19091)
CVE-2023-4870 | SourceCodester Contact Manager App 1.0 Contact Information index.php contactID cross site scripting (EUVD-2023-54709)
CVE-2023-4873 | Byzoro Smart S45F Multi-Service Secure Gateway Intelligent Management Platform /importexport.php os command injection (EUVD-2023-54712)
Medical Center of Marin Falls Victim to INC RANSOM
Кто стоит за ZeroDayX? Тайны цифровой войны Ирана и Израиля, где хакеры говорят на русском
Hundreds of MCP Servers Expose AI Models to Abuse, RCE
CVE-2008-5759 | FlatnuX 2008-12-11 index.php Name cross site scripting (EDB-7461 / XFDB-47367)
Trend Micro security advisory (AV25-373)
Threat Actors Distribute Compromised SonicWall SSL VPN NetExtender to Steal Sensitive Data
Threat actors were discovered disseminating a malicious, altered version of SonicWall’s SSL VPN NetExtender application in a complex cyberattack that was discovered through a partnership between SonicWall and Microsoft Threat Intelligence (MSTIC). NetExtender, a critical tool for remote users, facilitates secure connections to corporate networks, enabling seamless access to applications, file transfers, and network resources […]
The post Threat Actors Distribute Compromised SonicWall SSL VPN NetExtender to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Replacing a GitHub Personal Access Token With a GitHub Application
5 min readFollow this hands-on walkthrough to create a GitHub App, generate installation tokens, and swap fragile PATs out of your workflows.
The post Replacing a GitHub Personal Access Token With a GitHub Application appeared first on Aembit.
The post Replacing a GitHub Personal Access Token With a GitHub Application appeared first on Security Boulevard.
TeamViewer security advisory (AV25-372)
CVE-2014-9098 | Apptha Contus Video Gallery up to 2.4 videoadssearchQuery cross site scripting (ID 127611 / EDB-34161)
Multiple Brother Devices Vulnerabilities Open Devices for Hacking
A comprehensive security research investigation has unveiled eight critical vulnerabilities affecting 742 printer and multifunction device models across four major manufacturers. The discovery, stemming from a zero-day research project conducted by cybersecurity firm Rapid7, exposes severe security flaws in Brother Industries’ printer ecosystem that extend beyond the manufacturer’s own devices to impact models from FUJIFILM […]
The post Multiple Brother Devices Vulnerabilities Open Devices for Hacking appeared first on Cyber Security News.