Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for WordPress AI Engine  ...

 Firewall Daily

A security flaw affecting over 100,000 WordPress websites has been discovered in the AI Engine plugin, specifically impacting versions 2.9.3 and 2.9.4. The vulnerability, classified as an arbitrary file upload vulnerability, allows authenticated users, starting from subscriber-level access, to upload malicious files   show more ...

and potentially gain remote code execution (RCE) privileges on the server. This type of vulnerability could result in full site compromise.  The issue, tracked under CVE-2025-7847, was responsibly reported to Wordfence on July 18, 2025, by a researcher known as ISMAILSHADOW through the Wordfence Bug Bounty Program. The vulnerability was introduced just one day earlier, on July 17. For their timely discovery, the researcher was awarded a bounty of $1,170.  Technical Analysis of the AI Engine Vulnerability  The vulnerability resides in the rest_simpleFileUpload() function of the plugin, which failed to enforce proper file type validation. In affected versions, when the “Public API” option is enabled, which is disabled by default, any authenticated user could interact with the plugin’s REST API endpoint /mwai/v1/simpleFileUpload. Without any configured Bearer Token authentication, this endpoint accepts arbitrary files, including PHP scripts, allowing attackers to place malicious code in the site's public uploads directory.  The issue lies in the upload_file() function in the Meow_MWAI_Modules_Files class. This function used PHP’s native copy() function to store uploaded files without verifying the file’s MIME type or extension. As a result, attackers could bypass file restrictions and execute PHP scripts uploaded to the server. These scripts could be accessed via a browser, leading to remote code execution, one of the most dangerous outcomes of an arbitrary file upload vulnerability.  Exploitation Conditions  It’s important to notice that this flaw does not impact all AI Engine users. Exploitation requires that:  The "Public API" option in the plugin settings is enabled.  No Bearer Token or custom authentication method has been configured.  The user is authenticated (even a subscriber role is sufficient).  When these conditions are met, the plugin’s REST endpoint becomes vulnerable, giving low-level users a pathway to execute malicious server-side code.  Patch and Remediation  On July 22, 2025, the plugin developer, Jordy Meow, responded quickly and released version 2.9.5, which includes a fix. The patch introduces proper validation using WordPress's built-in wp_check_filetype() function in both the simpleFileUpload() and upload_file() methods. This ensures only permitted file types are accepted, effectively mitigating the vulnerability.  Security Measures and Timelines  July 18, 2025: Vulnerability submitted to Wordfence.  July 18, 2025: Validated and disclosed to the developer via the Wordfence Vulnerability Management Portal.  July 21, 2025: A firewall rule was deployed to Wordfence Premium, Care, and Response users.  July 22, 2025: Patched version 2.9.5 of AI Engine released.  August 20, 2025: Protection will be available to Wordfence Free users.  Wordfence’s rapid response helped narrow the opportunity for exploitation. Still, due to the seriousness of the CVE-2025-7847 vulnerability, all users of the AI Engine plugin are urged to update to version 2.9.5 or later immediately, particularly if their site has the Public API feature enabled.  Conclusion  The CVE-2025-7847 vulnerability in the AI Engine plugin stresses the importance of proper input validation and access control, especially for plugins with public API features. Even minor oversights can lead to serious security risks like remote code execution. With AI Engine’s widespread use, ensuring REST API endpoints are secured with authentication is essential. 

 Government

Beginning on October 12 a new program known as the Entry/Exit System (EES) will be launched, requiring biometric data instead of paper checks of passports in order to enter certain European countries.

 Feed

The threat actor linked to the exploitation of the recently disclosed security flaws in Microsoft SharePoint Server is using a bespoke command-and-control (C2) framework called AK47 C2 (also spelled ak47c2) in its operations. The framework includes at least two different types of clients, HTTP-based and Domain Name System (DNS)-based, which have been dubbed AK47HTTP and AK47DNS, respectively, by

 Feed

Cybersecurity researchers have flagged a malicious npm package that was generated using artificial intelligence (AI) and concealed a cryptocurrency wallet drainer. The package, @kodane/patch-manager, claims to offer "advanced license validation and registry optimization utilities for high-performance Node.js applications." It was uploaded to npm by a user named "Kodane" on July 28, 2025. The

 Feed

Just as triathletes know that peak performance requires more than expensive gear, cybersecurity teams are discovering that AI success depends less on the tools they deploy and more on the data that powers them The junk food problem in cybersecurity Imagine a triathlete who spares no expense on equipment—carbon fiber bikes, hydrodynamic wetsuits, precision GPS watches—but fuels their

 Feed

Cybersecurity researchers have disclosed a now-patched, high-severity security flaw in Cursor, a popular artificial intelligence (AI) code editor, that could result in remote code execution. The vulnerability, tracked as CVE-2025-54135 (CVSS score: 8.6), has been addressed in version 1.3 released on July 29, 2025. It has been codenamed CurXecute by Aim Labs, which previously disclosed EchoLeak.

 Feed

Cybersecurity researchers have detailed a new cluster of activity where threat actors are impersonating enterprises with fake Microsoft OAuth applications to facilitate credential harvesting as part of account takeover attacks. "The fake Microsoft 365 applications impersonate various companies, including RingCentral, SharePoint, Adobe, and Docusign," Proofpoint said in a Thursday report. The

 Cyber Security News

Source: thehackernews.com – Author: . The Russian nation-state threat actor known as Secret Blizzard has been observed orchestrating a new cyber espionage campaign targeting foreign embassies located in Moscow by means of an adversary-in-the-middle (AitM) attack at the Internet Service Provider (ISP) level and   show more ...

delivering a custom malware dubbed ApolloShadow. “ApolloShadow has the capability to […] La entrada Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Cybersecurity researchers have disclosed details of a new phishing campaign that conceals malicious payloads by abusing link wrapping services from Proofpoint and Intermedia to bypass defenses. “Link wrapping is designed by vendors like Proofpoint to protect users by   show more ...

routing all clicked URLs through a scanning service, allowing them to block […] La entrada Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting two different organizations by approaching their employees via LinkedIn and Telegram. “Under the guise of freelance opportunities for software development work, UNC4899   show more ...

leveraged social engineering techniques to successfully convince the targeted employees to execute malicious Docker […] La entrada N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 AI-Driven

Source: thehackernews.com – Author: . Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and adoption of AI, it is more critical than ever to ensure the endpoint is adequately   show more ...

secured by a platform capable […] La entrada AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: security.googleblog.com – Author: Kimberly Samra. Security Blog The latest news and insights from Google on security and safety on the Internet Original Post url: http://security.googleblog.com/2025/06/mitigating-prompt-injection-attacks.html Category & Tags: AI Security – AI Security Views:   show more ...

0 La entrada Mitigating prompt injection attacks with a layered defense strategy – Source:security.googleblog.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Source: securityaffairs.com – Author: Pierluigi Paganini Russia-linked Secret Blizzard targets foreign embassies in Moscow via ISP-level AitM attacks, deploying custom ApolloShadow malware. Microsoft researchers uncovered a cyberespionage campaign by the Russia-linked APT group Secret Blizzard   show more ...

(aka Turla, Snake, Uroburos, Waterbug, Venomous Bear and KRYPTON)  targeting foreign embassies in Moscow. The threat actor uses an adversary-in-the-middle (AiTM) method at the ISP level to […] La entrada Russia-linked APT Secret Blizzard targets foreign embassies in Moscow with ApolloShadow malware – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Alone WordPress theme

Source: securityaffairs.com – Author: Pierluigi Paganini Hackers exploit a critical vulnerability, tracked as CVE-2025-5394 (CVSS score of 9.8), in the Alone WordPress theme to hijack sites. Threat actors are actively exploiting a critical flaw, tracked as CVE-2025-5394 (CVSS score of 9.8), in the “Alone –   show more ...

Charity Multipurpose Non-profit WordPress Theme” to compromise websites. On May […] La entrada Attackers actively exploit critical zero-day in Alone WordPress Theme – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini Critical flaws in Dahua cameras let hackers take control remotely. The vendor has released patches, users should update firmware asap. Bitdefender cybersecurity experts discovered serious vulnerabilities in Dahua smart cameras that could have allowed   show more ...

hackers to take full control of the devices remotely. Fortunately, the vulnerabilities have been patched, […] La entrada Dahua Camera flaws allow remote hacking. Update firmware now – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini Researchers have released a decryptor for the ransomware FunkSec, allowing victims to recover their encrypted files for free. Researchers at Avast developed a decryptor for the FunkSec ransomware. Gen Digital researchers released a decryptor for the   show more ...

FunkSec ransomware after cooperating with law enforcement to neutralize the threat. “Researchers at […] La entrada Researchers released a decryptor for the FunkSec ransomware – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Waqas. The Everest ransomware group is claiming responsibility for breaching Mailchimp, the popular marketing platform used to create, send and manage email campaigns and newsletters. The group made the announcement earlier today on its dark web leak site, claiming to have stolen   show more ...

a 767 MB database containing 943,536 lines of data. […] La entrada Everest Ransomware Claims Mailchimp as New Victim in Relatively Small Breach – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Deeba Ahmed. A sophisticated new ransomware campaign is actively tricking internet users around the world by employing fake verification pages to spread a dangerous threat called Epsilon Red malware. This critical finding is revealed in the latest threat intelligence report by   show more ...

CloudSEK, a leading cybersecurity firm. The ongoing campaign, first spotted […] La entrada OnlyFans, Discord ClickFix-Themed Pages Spread Epsilon Red Ransomware – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 AI

Source: www.securityweek.com – Author: Eduard Kovacs Browser security firm LayerX has disclosed a new attack method that works against popular gen-AI tools. The attack involves browser extensions and it can be used for covert data exfiltration. The method, named Man-in-the-Prompt, has been tested against   show more ...

several highly popular large language models (LLMs), including ChatGPT, Gemini, Copilot, […] La entrada Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data  – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Android

Source: www.infosecurity-magazine.com – Author: A sophisticated Android banking Trojan, dubbed “DoubleTrouble,” has recently expanded both its delivery methods and technical capabilities, posing a significant threat to users across Europe. Initially spread through phishing websites impersonating major   show more ...

banks, the malware now distributes its payload via Discord-hosted APKs, making detection and prevention more difficult. Researchers at Zimperium […] La entrada Android Malware Targets Banking Users Through Discord Channels – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: A new tool aimed at streamlining cyber incident response and helping organizations evict adversaries from compromised systems has been released by the US Cybersecurity and Infrastructure Security Agency (CISA).  The Eviction Strategies Tool is a free resource   show more ...

developed in collaboration with MITRE to support defenders in building rapid, tailored response plans. Designed […] La entrada CISA Unveils Eviction Strategies Tool to Aid Incident Response – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Ransomware actors are resorting to extreme measures to pressure victims into paying demands, including threats of physical harm to business executives. Over the past 12 months, executives were physically threatened in 40% of ransomware incidents, according to a   show more ...

new report by Semperis. This tactic increased to 46% of cases impacting US-based […] La entrada Ransomware Attacks Escalate to Physical Threats Against Executives – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . The threat actor linked to the exploitation of the recently disclosed security flaws in Microsoft SharePoint Server is using a bespoke command-and-control (C2) framework called AK47 C2 (also spelled ak47c2) in its operations. The framework includes at least two different   show more ...

types of clients, HTTP-based and Domain Name System (DNS)-based, which […] La entrada Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.nist.gov – Author: Jody Jacobs, Julie Haney. Human-centered cybersecurity (also known as ‘usable security’) involves the social, organizational, and technological influences on people’s understanding of and interactions with cybersecurity. By taking a human-centered cybersecurity (HCC)   show more ...

approach, we can both improve people’s cybersecurity experiences and achieve better cybersecurity outcomes, which is so important in today’s […] La entrada Learning, Sharing, and Exploring with NIST’s New Human-Centered Cybersecurity Community of Interest – Source:www.nist.gov se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.nist.gov – Author: Joseph Near, David Darais, Mark Durkee. In this post, we talk with Dr. Xiaowei Huang and Dr. Yi Dong (University of Liverpool), Dr. Mat Weldon (United Kingdom (UK) Office of National Statistics (ONS)), and Dr. Michael Fenton (Trūata) who were winners in the UK-US   show more ...

Privacy-Enhancing Technologies (PETs) Prize Challenges. We discuss […] La entrada Implementation Challenges in Privacy-Preserving Federated Learning – Source:www.nist.gov se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2025-08
Aggregator history
Friday, August 01
FRI
SAT
SUN
MON
TUE
WED
THU
AugustSeptember