AI’s Dark Side: How a New Website Builder Is Fueling a Surge in Cybercrime
AI’s Dark Side: How a New Website Builder Is Fueling a Surge in Cybercrime Example CAPTCHA that redirects to banking credential phishing website | Image: Proofpoint Artificial intelligence is lowering the barrier to cybercrime. According to a new report by Proofpoint, threat … Read more Published Date: Aug 21, 2025 (12 hours, 29 minutes ago) Vulnerabilities has […]
A Decade of Espionage: How a Russian APT Exploited Cisco Devices (CVE-2018-0171) for Years
A Decade of Espionage: How a Russian APT Exploited Cisco Devices (CVE-2018-0171) for Years Cisco Talos has released a new analysis exposing “Static Tundra,” a Russian state-sponsored threat actor that has been exploiting unpatched and end-of-life Cisco devices for more than a decade. The gr … Read more Published Date: Aug 21, 2025 (12 hours, 33 minutes […]
How Attackers Exploit and Then Patch a Vulnerability to Hide in Linux Systems
How Attackers Exploit and Then Patch a Vulnerability to Hide in Linux Systems Red Canary has revealed a sophisticated attack campaign targeting cloud-based Linux systems through a critical remote code execution flaw in Apache ActiveMQ (CVE-2023-46604). The campaign showcases ho … Read more Published Date: Aug 21, 2025 (12 hours, 48 minutes ago) Vulnerabilities has been mentioned […]
CVE-2025-9264 – Xuxueli XXL-Job ID Resource Manipulation Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-9264 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 21, 2025 Action […]
CVE-2025-54988: Critical XXE Vulnerability in Apache Tika PDF Parser Exposes Sensitive Data
CVE-2025-54988: Critical XXE Vulnerability in Apache Tika PDF Parser Exposes Sensitive Data The widely used Apache Tika toolkit, a powerful library for detecting and extracting metadata and text from over a thousand file formats, has been found vulnerable to a critical XML External Entity (X … Read more Published Date: Aug 21, 2025 (12 hours, 54 minutes […]
Beyond the Inbox: How a Cyber-Espionage Group Is Exploiting Two WinRAR Vulnerabilities
Beyond the Inbox: How a Cyber-Espionage Group Is Exploiting Two WinRAR Vulnerabilities BI.ZONE Threat Intelligence uncovered a series of targeted cyber-espionage campaigns conducted by the Paper Werewolf (GOFFEE) cluster, which weaponized both a known WinRAR vulnerability (CVE-2025-6218 … Read more Published Date: Aug 21, 2025 (13 hours, 5 minutes ago) Vulnerabilities has been mentioned in this article. […]
CVE-2025-9263 – Xuxueli XXL-Job Remote Resource Identifier Manipulation Vulnerability
The following table lists the changes that have been made to the CVE-2025-9263 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 20, 2025 Action […]
CVE-2025-9262 – “Wong2 mcp-cli OAuth Handler Remote OS Command Injection Vulnerability”
The following table lists the changes that have been made to the CVE-2025-9262 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 20, 2025 Action […]
CVE-2025-9253 – Linksys Router Stack-Based Buffer Overflow
The following table lists the changes that have been made to the CVE-2025-9253 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 20, 2025 Action […]