Aggregator
Gemini CLI Vulnerability Allows Silent Execution of Malicious Commands on Developer Systems
Security researchers at Tracebit have discovered a critical vulnerability in Google’s Gemini CLI that enables attackers to silently execute malicious commands on developers’ systems through a sophisticated combination of prompt injection, improper validation, and misleading user interface design. The vulnerability, classified as a P1/S1 issue by Google’s security team, has been patched in the latest […]
The post Gemini CLI Vulnerability Allows Silent Execution of Malicious Commands on Developer Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-52880 | Insyde InsydeH2O up to 05.70.49 VariableRuntimeDxe Driver denial of service
CVE-2025-7810 | StreamWeasels Kick Integration Plugin up to 1.1.4 on WordPress cross site scripting (EUVD-2025-22970)
CVE-2025-7809 | StreamWeasels Twitch Integration Plugin up to 1.9.3 on WordPress cross site scripting (EUVD-2025-22969)
CVE-2025-7811 | StreamWeasels YouTube Integration Plugin up to 1.4.0 on WordPress cross site scripting (EUVD-2025-22968)
CVE-2025-6495 | Bricks Builder Plugin up to 1.12.4 on WordPress sql injection (EUVD-2025-22967)
CVE-2025-4370 | Brizy Plugin up to 2.6.20 on WordPress TXT File store_file authorization (EUVD-2025-22964)
CVE-2025-4566 | Elementor Plugin up to 3.30.2 on WordPress Text Path Widget cross site scripting (EUVD-2025-22965)
CVE-2025-8264 | z-push/z-push-dev up to 2.7.5 Username sql injection (SNYK-PHP-ZPUSHZPUSHDEV-10908180)
CVE-2025-53077 | Samsung Electronics Data Management Server prior 2.3.13.1/2.6.14.1/2.9.3.6 redirect
CVE-2025-53080 | Samsung Electronics Data Management Server prior 2.3.13.1/2.6.14.1/2.9.3.6 path traversal
CVE-2025-53649 | SwitchBot App up to 9.12 on iOS/Android User Information log file
CVE-2025-53078 | Samsung Electronics Data Management Server prior 2.3.13.1/2.6.14.1/2.9.3.6 deserialization
CVE-2025-53079 | Samsung Electronics Data Management Server prior 2.3.13.1/2.6.14.1/2.9.3.6 absolute path traversal
Sealed Chain of Deception: Actors leveraging Node.JS to Launch JSCeal
Key Points Introduction Following our VIEW8 publication, an open source tool for analysis of Compiled JavaScript files (JSC), we are continuously tracking the usage of such files by threat actors. Among the threats we identified, a significant campaign caught our attention, which we call JSCEAL. The campaign, which impersonates common crypto trading apps, has been active since […]
The post Sealed Chain of Deception: Actors leveraging Node.JS to Launch JSCeal appeared first on Check Point Research.
CVE-2025-4600 | Google Cloud Classic Application Load Balancer request smuggling (gcp-2025-027 / EUVD-2025-15449)
Возможно ли отключить свет, вентиляцию и пожарную защиту одним эксплойтом? Запросто. И мир к этому не готов
Critical CodeIgniter Flaw Exposes Millions of Web Apps to File Upload Attacks
A critical security vulnerability in CodeIgniter4’s ImageMagick handler has been discovered that could allow attackers to execute arbitrary commands on affected web applications through malicious file uploads. The vulnerability, tracked as CVE-2025-54418, has been assigned a maximum CVSS score of 10.0, indicating its severe nature and potential for widespread exploitation. Vulnerability Overview and Attack Vectors […]
The post Critical CodeIgniter Flaw Exposes Millions of Web Apps to File Upload Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Fighting AI with AI: How Darwinium is reshaping fraud defense
AI agents are showing up in more parts of the customer journey, from product discovery to checkout. And fraudsters are also putting them to work, often with alarming success. In response, cyberfraud prevention leader Darwinium is launching two AI-powered features, Beagle and Copilot, that simulate adversarial behavior and help security teams stay ahead of threats. Announced just ahead of Black Hat USA 2025, these features are designed to give defenders their own AI capabilities. Beagle … More →
The post Fighting AI with AI: How Darwinium is reshaping fraud defense appeared first on Help Net Security.