A security flaw affecting over 100,000 WordPress websites has been discovered in the AI Engine plugin, specifically impacting versions 2.9.3 and 2.9.4. The vulnerability, classified as an arbitrary file upload vulnerability, allows authenticated users, starting from subscriber-level access, to upload malicious files show more ...
and potentially gain remote code execution (RCE) privileges on the server. This type of vulnerability could result in full site compromise. The issue, tracked under CVE-2025-7847, was responsibly reported to Wordfence on July 18, 2025, by a researcher known as ISMAILSHADOW through the Wordfence Bug Bounty Program. The vulnerability was introduced just one day earlier, on July 17. For their timely discovery, the researcher was awarded a bounty of $1,170. Technical Analysis of the AI Engine Vulnerability The vulnerability resides in the rest_simpleFileUpload() function of the plugin, which failed to enforce proper file type validation. In affected versions, when the “Public API” option is enabled, which is disabled by default, any authenticated user could interact with the plugin’s REST API endpoint /mwai/v1/simpleFileUpload. Without any configured Bearer Token authentication, this endpoint accepts arbitrary files, including PHP scripts, allowing attackers to place malicious code in the site's public uploads directory. The issue lies in the upload_file() function in the Meow_MWAI_Modules_Files class. This function used PHP’s native copy() function to store uploaded files without verifying the file’s MIME type or extension. As a result, attackers could bypass file restrictions and execute PHP scripts uploaded to the server. These scripts could be accessed via a browser, leading to remote code execution, one of the most dangerous outcomes of an arbitrary file upload vulnerability. Exploitation Conditions It’s important to notice that this flaw does not impact all AI Engine users. Exploitation requires that: The "Public API" option in the plugin settings is enabled. No Bearer Token or custom authentication method has been configured. The user is authenticated (even a subscriber role is sufficient). When these conditions are met, the plugin’s REST endpoint becomes vulnerable, giving low-level users a pathway to execute malicious server-side code. Patch and Remediation On July 22, 2025, the plugin developer, Jordy Meow, responded quickly and released version 2.9.5, which includes a fix. The patch introduces proper validation using WordPress's built-in wp_check_filetype() function in both the simpleFileUpload() and upload_file() methods. This ensures only permitted file types are accepted, effectively mitigating the vulnerability. Security Measures and Timelines July 18, 2025: Vulnerability submitted to Wordfence. July 18, 2025: Validated and disclosed to the developer via the Wordfence Vulnerability Management Portal. July 21, 2025: A firewall rule was deployed to Wordfence Premium, Care, and Response users. July 22, 2025: Patched version 2.9.5 of AI Engine released. August 20, 2025: Protection will be available to Wordfence Free users. Wordfence’s rapid response helped narrow the opportunity for exploitation. Still, due to the seriousness of the CVE-2025-7847 vulnerability, all users of the AI Engine plugin are urged to update to version 2.9.5 or later immediately, particularly if their site has the Public API feature enabled. Conclusion The CVE-2025-7847 vulnerability in the AI Engine plugin stresses the importance of proper input validation and access control, especially for plugins with public API features. Even minor oversights can lead to serious security risks like remote code execution. With AI Engine’s widespread use, ensuring REST API endpoints are secured with authentication is essential.
By creating a safe environment for open discussion, prioritizing human context alongside technical data, and involving diverse stakeholders, organizations can turn security incidents into accelerators of resilience.
ISC2 is launching a 6-course certification program to address the growing demand for AI security expertise. Courses cover topics such as AI fundamentals, ethics, and risks.
Security debt ahoy: Only about half of the code that the latest large language models (LLMs) create is cybersecure, and more and more of it is being created all the time.
When trying to crack your way into a cyber career, true passion and a bold love of the industry is a must, if you want to set yourself apart from hundreds of other job applicants, according to Weave CISO Jessica Sica.
Beginning on October 12 a new program known as the Entry/Exit System (EES) will be launched, requiring biometric data instead of paper checks of passports in order to enter certain European countries.
Authorities in Luxembourg said a nationwide telecommunications outage in July was caused by a deliberately disruptive cyberattack. Huawei networking products were reportedly the target.
Dark Reading's 2025 News Desk marks a decade of Black Hat USA memories. We're making our return with a slate of interviews that help you stay up on the latest research from Black Hat — no trip to Las Vegas required.
The threat actor linked to the exploitation of the recently disclosed security flaws in Microsoft SharePoint Server is using a bespoke command-and-control (C2) framework called AK47 C2 (also spelled ak47c2) in its operations. The framework includes at least two different types of clients, HTTP-based and Domain Name System (DNS)-based, which have been dubbed AK47HTTP and AK47DNS, respectively, by
Cybersecurity researchers have flagged a malicious npm package that was generated using artificial intelligence (AI) and concealed a cryptocurrency wallet drainer. The package, @kodane/patch-manager, claims to offer "advanced license validation and registry optimization utilities for high-performance Node.js applications." It was uploaded to npm by a user named "Kodane" on July 28, 2025. The
Just as triathletes know that peak performance requires more than expensive gear, cybersecurity teams are discovering that AI success depends less on the tools they deploy and more on the data that powers them The junk food problem in cybersecurity Imagine a triathlete who spares no expense on equipment—carbon fiber bikes, hydrodynamic wetsuits, precision GPS watches—but fuels their
Cybersecurity researchers have disclosed a now-patched, high-severity security flaw in Cursor, a popular artificial intelligence (AI) code editor, that could result in remote code execution. The vulnerability, tracked as CVE-2025-54135 (CVSS score: 8.6), has been addressed in version 1.3 released on July 29, 2025. It has been codenamed CurXecute by Aim Labs, which previously disclosed EchoLeak.
Cybersecurity researchers have detailed a new cluster of activity where threat actors are impersonating enterprises with fake Microsoft OAuth applications to facilitate credential harvesting as part of account takeover attacks. "The fake Microsoft 365 applications impersonate various companies, including RingCentral, SharePoint, Adobe, and Docusign," Proofpoint said in a Thursday report. The
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
Source: thehackernews.com – Author: . The Russian nation-state threat actor known as Secret Blizzard has been observed orchestrating a new cyber espionage campaign targeting foreign embassies located in Moscow by means of an adversary-in-the-middle (AitM) attack at the Internet Service Provider (ISP) level and show more ...
delivering a custom malware dubbed ApolloShadow. “ApolloShadow has the capability to […] La entrada Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: thehackernews.com – Author: . Cybersecurity researchers have disclosed details of a new phishing campaign that conceals malicious payloads by abusing link wrapping services from Proofpoint and Intermedia to bypass defenses. “Link wrapping is designed by vendors like Proofpoint to protect users by show more ...
routing all clicked URLs through a scanning service, allowing them to block […] La entrada Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: thehackernews.com – Author: . The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting two different organizations by approaching their employees via LinkedIn and Telegram. “Under the guise of freelance opportunities for software development work, UNC4899 show more ...
leveraged social engineering techniques to successfully convince the targeted employees to execute malicious Docker […] La entrada N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: thehackernews.com – Author: . Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and adoption of AI, it is more critical than ever to ensure the endpoint is adequately show more ...
secured by a platform capable […] La entrada AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: security.googleblog.com – Author: Kimberly Samra. Security Blog The latest news and insights from Google on security and safety on the Internet Original Post url: http://security.googleblog.com/2025/06/mitigating-prompt-injection-attacks.html Category & Tags: AI Security – AI Security Views: show more ...
0 La entrada Mitigating prompt injection attacks with a layered defense strategy – Source:security.googleblog.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityaffairs.com – Author: Pierluigi Paganini Russia-linked Secret Blizzard targets foreign embassies in Moscow via ISP-level AitM attacks, deploying custom ApolloShadow malware. Microsoft researchers uncovered a cyberespionage campaign by the Russia-linked APT group Secret Blizzard show more ...
(aka Turla, Snake, Uroburos, Waterbug, Venomous Bear and KRYPTON) targeting foreign embassies in Moscow. The threat actor uses an adversary-in-the-middle (AiTM) method at the ISP level to […] La entrada Russia-linked APT Secret Blizzard targets foreign embassies in Moscow with ApolloShadow malware – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityaffairs.com – Author: Pierluigi Paganini Hackers exploit a critical vulnerability, tracked as CVE-2025-5394 (CVSS score of 9.8), in the Alone WordPress theme to hijack sites. Threat actors are actively exploiting a critical flaw, tracked as CVE-2025-5394 (CVSS score of 9.8), in the “Alone – show more ...
Charity Multipurpose Non-profit WordPress Theme” to compromise websites. On May […] La entrada Attackers actively exploit critical zero-day in Alone WordPress Theme – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityaffairs.com – Author: Pierluigi Paganini Critical flaws in Dahua cameras let hackers take control remotely. The vendor has released patches, users should update firmware asap. Bitdefender cybersecurity experts discovered serious vulnerabilities in Dahua smart cameras that could have allowed show more ...
hackers to take full control of the devices remotely. Fortunately, the vulnerabilities have been patched, […] La entrada Dahua Camera flaws allow remote hacking. Update firmware now – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityaffairs.com – Author: Pierluigi Paganini Researchers have released a decryptor for the ransomware FunkSec, allowing victims to recover their encrypted files for free. Researchers at Avast developed a decryptor for the FunkSec ransomware. Gen Digital researchers released a decryptor for the show more ...
FunkSec ransomware after cooperating with law enforcement to neutralize the threat. “Researchers at […] La entrada Researchers released a decryptor for the FunkSec ransomware – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: hackread.com – Author: Waqas. The Everest ransomware group is claiming responsibility for breaching Mailchimp, the popular marketing platform used to create, send and manage email campaigns and newsletters. The group made the announcement earlier today on its dark web leak site, claiming to have stolen show more ...
a 767 MB database containing 943,536 lines of data. […] La entrada Everest Ransomware Claims Mailchimp as New Victim in Relatively Small Breach – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: hackread.com – Author: Deeba Ahmed. A sophisticated new ransomware campaign is actively tricking internet users around the world by employing fake verification pages to spread a dangerous threat called Epsilon Red malware. This critical finding is revealed in the latest threat intelligence report by show more ...
CloudSEK, a leading cybersecurity firm. The ongoing campaign, first spotted […] La entrada OnlyFans, Discord ClickFix-Themed Pages Spread Epsilon Red Ransomware – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.securityweek.com – Author: Eduard Kovacs Browser security firm LayerX has disclosed a new attack method that works against popular gen-AI tools. The attack involves browser extensions and it can be used for covert data exfiltration. The method, named Man-in-the-Prompt, has been tested against show more ...
several highly popular large language models (LLMs), including ChatGPT, Gemini, Copilot, […] La entrada Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.infosecurity-magazine.com – Author: A sophisticated Android banking Trojan, dubbed “DoubleTrouble,” has recently expanded both its delivery methods and technical capabilities, posing a significant threat to users across Europe. Initially spread through phishing websites impersonating major show more ...
banks, the malware now distributes its payload via Discord-hosted APKs, making detection and prevention more difficult. Researchers at Zimperium […] La entrada Android Malware Targets Banking Users Through Discord Channels – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.infosecurity-magazine.com – Author: A new tool aimed at streamlining cyber incident response and helping organizations evict adversaries from compromised systems has been released by the US Cybersecurity and Infrastructure Security Agency (CISA). The Eviction Strategies Tool is a free resource show more ...
developed in collaboration with MITRE to support defenders in building rapid, tailored response plans. Designed […] La entrada CISA Unveils Eviction Strategies Tool to Aid Incident Response – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.infosecurity-magazine.com – Author: Ransomware actors are resorting to extreme measures to pressure victims into paying demands, including threats of physical harm to business executives. Over the past 12 months, executives were physically threatened in 40% of ransomware incidents, according to a show more ...
new report by Semperis. This tactic increased to 46% of cases impacting US-based […] La entrada Ransomware Attacks Escalate to Physical Threats Against Executives – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: thehackernews.com – Author: . The threat actor linked to the exploitation of the recently disclosed security flaws in Microsoft SharePoint Server is using a bespoke command-and-control (C2) framework called AK47 C2 (also spelled ak47c2) in its operations. The framework includes at least two different show more ...
types of clients, HTTP-based and Domain Name System (DNS)-based, which […] La entrada Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.nist.gov – Author: Jody Jacobs, Julie Haney. Human-centered cybersecurity (also known as ‘usable security’) involves the social, organizational, and technological influences on people’s understanding of and interactions with cybersecurity. By taking a human-centered cybersecurity (HCC) show more ...
approach, we can both improve people’s cybersecurity experiences and achieve better cybersecurity outcomes, which is so important in today’s […] La entrada Learning, Sharing, and Exploring with NIST’s New Human-Centered Cybersecurity Community of Interest – Source:www.nist.gov se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.nist.gov – Author: Joseph Near, David Darais, Mark Durkee. In this post, we talk with Dr. Xiaowei Huang and Dr. Yi Dong (University of Liverpool), Dr. Mat Weldon (United Kingdom (UK) Office of National Statistics (ONS)), and Dr. Michael Fenton (Trūata) who were winners in the UK-US show more ...
Privacy-Enhancing Technologies (PETs) Prize Challenges. We discuss […] La entrada Implementation Challenges in Privacy-Preserving Federated Learning – Source:www.nist.gov se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.