Aggregator
New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards
A sophisticated new cybercriminal campaign has emerged, leveraging a Python-based information stealer known as PXA Stealer to orchestrate one of the most extensive data theft operations observed in recent months. The malware, which first surfaced in late 2024, has evolved into a highly evasive multi-stage operation that has successfully compromised over 4,000 unique victims across […]
The post New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards appeared first on Cyber Security News.
Baden-Württemberg State Association for Prevention & Rehabilitation gGmbH Falls Victim to Brain Cipher Ransomware
SonicWall VPNs Actively Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware
A likely zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) VPNs and firewall appliances is being actively exploited in the wild, enabling attackers to bypass multi-factor authentication (MFA) and deploy ransomware within hours of the initial breach. Security firms, including Huntress, Arctic Wolf, and Sophos, have reported a recent surge in high-severity incidents targeting these […]
The post SonicWall VPNs Actively Exploited for 0-Day Vulnerability to Bypass MFA and Deploy Ransomware appeared first on Cyber Security News.
Без аутентификации. Без действий. Просто пришёл и взломал: дыра в Squid
Hacking group D4rk4rmy claimed the hack of Monte-Carlo Société des Bains de Mer
CVE-2025-26063 | Intelbras RX 1500/RX 3000 prior 2.2.12 Site Survey Page /HNAP1/ cross site scripting
CVE-2025-37109 | HPE Telco Service Activator up to 10.3.1 cross site scripting
CVE-2025-37110 | HPE Telco Network Function Virtual Orchestrator up to 7.3.0 sensitive information
CVE-2025-37111 | HPE Telco Network Function Virtual Orchestrator up to 7.3.0 Storage Policy hard-coded credentials
CVE-2025-37112 | HPE Telco Network Function Virtual Orchestrator up to 7.3.0 Encryption Key hard-coded credentials
CVE-2025-6398 | ASUS AI Suite prior 3.03.42 IOMap64.sys null pointer dereference
CVE-2023-44976 | Hangzhou Shunwang Rentdrv2 prior 2024-12-24 exposed ioctl with insufficient access control (EUVD-2023-49299)
CVE-2025-8286 | Güralp FMUS Series Seismic Monitoring Device Telnet-based Command Line Interface missing authentication (icsa-25-212-01 / EUVD-2025-23300)
CVE-2025-37108 | HPE Telco Service Activator up to 10.3.1 cross site scripting (EUVD-2025-23302)
CVE-2025-26064 | Intelbras RX 1500/RX 3000 prior 2.2.12 Connected Clients Page /HNAP1/ cross site scripting
CVE-2025-26062 | Intelbras RX 1500/RX 3000 prior 2.2.12 access control
CVE-2025-4684 | Blockspare Plugin up to 3.2.13.1 on WordPress Image Carousel/Image Slider cross site scripting
CVE-2025-6228 | Sina Extension for Elementor Plugin up to 3.7.0 on WordPress Sina Posts/Sina Blog Post/Sina Table cross site scripting
New LegalPwn Attack Exploits Gemini, ChatGPT and other AI Tools into Executing Malicious Code via Disclaimers
A sophisticated new attack method that exploits AI models’ tendency to comply with legal-sounding text, successfully bypassing safety measures in popular development tools. A study by Pangea AI Security has revealed a novel prompt injection technique dubbed “LegalPwn” that weaponizes legal disclaimers, copyright notices, and terms of service to manipulate large language models (LLMs) into […]
The post New LegalPwn Attack Exploits Gemini, ChatGPT and other AI Tools into Executing Malicious Code via Disclaimers appeared first on Cyber Security News.