Aggregator
CVE-2025-47571 | Super Store Finder Plugin up to 6.9.7 on WordPress file inclusion
CVE-2025-53560 | Noisa Plugin up to 2.6.0 on WordPress deserialization
CVE-2025-23263 | NVIDIA DOCA-Host/Mellanox OFED incorrect execution-assigned permissions (EUVD-2025-21786)
CVE-2025-47189 | Netwrix Directory Manager up to 2025-05-01 cross site scripting (EUVD-2025-21777)
CVE-2025-53867 | Island Lake WebBatch prior 2025C URL privilege escalation (EUVD-2025-21782)
CVE-2023-47356 | Mingyu Security Gateway prior 3.0-5.3p /log/fw_security.mds log_type privilege escalation
CVE-2025-52046 | TOTOLINK A3300R 17.0.0cu.596_B20250515 sub_4197C0 desc command injection
CVE-2025-7339 | jshttp on-headers up to 1.0.x Response Header response.writeHead unexpected data type (ID 315 / EUVD-2025-21784)
CVE-2025-7338 | expressjs multer up to 2.0.1 Multi-part Upload Request uncaught exception (GHSA-fjgf-rc76-4x9p / EUVD-2025-21776)
CVE-2025-54066 | DIRACGrid diracx-web up to 0.1.0-a7 redirect (GHSA-hfj7-542q-8fvv / EUVD-2025-21778)
CVE-2024-32323 | cnhcit Haichang OA 1.0.0 hcit.project.rte.agents.UploadImages.class if sql injection
CVE-2023-41566 | OA EKP 16 sysUiExtend.do permission
Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
The global hacktivist landscape has undergone a dramatic transformation since 2022, evolving from primarily ideologically motivated actors into a complex ecosystem where attention-seeking behavior and monetization strategies drive operational decisions. This shift has fundamentally altered how these groups select targets and conduct campaigns, creating new challenges for cybersecurity professionals and organizations worldwide. Recent analysis reveals […]
The post Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets appeared first on Cyber Security News.
Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
Valve сдалась: Steam теперь танцует под дудку банков и платёжных систем
H2Miner Attacking Linux, Windows, and Containers to Mine Monero
The H2Miner botnet, first observed in late 2019, has resurfaced with an expanded arsenal that blurs the line between cryptojacking and ransomware. The latest campaign leverages inexpensive virtual private servers (VPS) and a grab-bag of commodity malware to compromise Linux hosts, Windows workstations, and container workloads simultaneously. By chaining cloud-aware shell scripts, cross-compiled binaries, and […]
The post H2Miner Attacking Linux, Windows, and Containers to Mine Monero appeared first on Cyber Security News.