PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware

PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware A sophisticated malware campaign has been identified, utilizing PipeMagic, a highly modular backdoor deployed by the financially motivated threat actor Storm-2460. This advanced malware masquerades as … Read more Published Date: Aug 19, 2025 (1 hour, 23 minutes ago) Vulnerabilities has been mentioned in this […]

SSH Keys Are Crucial for Secure Remote Access but Often Remain a Blind Spot in Enterprise Security

SSH Keys Are Crucial for Secure Remote Access but Often Remain a Blind Spot in Enterprise Security Enterprise security strategies have evolved dramatically to address modern threats, yet SSH keys—critical cryptographic credentials that provide direct access to mission-critical systems—remain largel … Read more Published Date: Aug 19, 2025 (1 hour, 31 minutes ago) Vulnerabilities has been mentioned […]

CVE-2025-8218 – WordPress Properties Directory Theme Role Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-8218 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 19, 2025 Action […]

CVE-2025-6758 – WordPress Properties Directory Theme Privilege Escalation

The following table lists the changes that have been made to the CVE-2025-6758 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 19, 2025 Action […]

CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks

CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks CISA has issued a critical warning regarding a high-severity OS command injection vulnerability in Trend Micro Apex One Management Console that threat actors are actively exploiting in the wild. The v … Read more Published Date: Aug 19, 2025 (2 hours, 26 minutes […]

CVE-2025-38553 – Linux Kernel Netem Qdisc Tree Duplication Vulnerability

In the Linux kernel, the following vulnerability has been resolved: net/sched: Restrict conditions for adding duplicating netems to qdisc tree netem_enqueue’s duplication prevention logic breaks when a netem resides in a qdisc tree with other netems – this can lead to a soft lockup and OOM loop in netem_dequeue, as seen in [1]. Ensure that […]

CVE-2025-8357 – WordPress Media Library Assistant Unauthenticated File Deletion Vulnerability

CVE ID : CVE-2025-8357 Published : Aug. 19, 2025, 5:15 a.m. | 1 hour, 55 minutes ago Description : The Media Library Assistant plugin for WordPress is vulnerable to arbitrary file deletion in the /wp-content/uploads directory due to insufficient file path validation and user capability checking in the _process_mla_download_file function in all versions up to, and including, […]

CVE-2025-5417 – Red Hat Developer Hub Improper Access Control Vulnerability

An insufficient access control vulnerability was found in the Red Hat Developer Hub rhdh/rhdh-hub-rhel9 container image. The Red Hat Developer Hub cluster admin/user, who has standard user access to the cluster, and the Red Hat Developer Hub namespace, can access the rhdh/rhdh-hub-rhel9 container image and modify the image’s content. This issue affects the confidentiality and […]

Threat Actors Abuse Microsoft Help Index File to Execute PipeMagic Malware

Threat Actors Abuse Microsoft Help Index File to Execute PipeMagic Malware Cybersecurity researchers have uncovered a sophisticated malware campaign exploiting Microsoft Help Index Files (.mshi) to deliver the notorious PipeMagic backdoor, marking a significant evolution in … Read more Published Date: Aug 19, 2025 (3 hours, 55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-29824 […]

CVE-2025-7496 – WPC Smart Compare for WooCommerce Stored Cross-Site Scripting (XSS)

CVE ID : CVE-2025-7496 Published : Aug. 19, 2025, 4:15 a.m. | 25 minutes ago Description : The WPC Smart Compare for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via DOM elements in all versions up to, and including, 6.4.7 due to insufficient input sanitization and output escaping. This makes it possible for […]