Posted by Egidio Romano on Dec 27 —————————————————————– PKP-WAL <= 3.5.0-1 (baseColour) LESS Code Injection Vulnerability —————————————————————– [-] Software Links: https://pkp.sfu.ca https://github.com/pkp/pkp-lib [-] Affected Versions: PKP Web Application Library (aka PKP-WAL or pkp-lib) version 3.4.0-9 and prior versions, and version 3.5.0-1 and prior versions, as used in Open Journal… – Read More – Full Disclosure
Author: Joe-W
Posted by Egidio Romano on Dec 27 ———————————————————————– PKP-WAL <= 3.5.0-3 (X-Forwarded-Host) LESS Code Injection Vulnerability ———————————————————————– [-] Software Links: https://pkp.sfu.ca https://github.com/pkp/pkp-lib [-] Affected Versions: PKP Web Application Library (aka PKP-WAL or pkp-lib) version 3.4.0-10 and prior versions, and version 3.5.0-3 and prior versions, as… – Read More – Full Disclosure
Posted by Egidio Romano on Dec 27 —————————————————————– PKP-WAL <= 3.5.0-1 Login Cross-Site Request Forgery Vulnerability —————————————————————– [-] Software Links: https://pkp.sfu.ca https://github.com/pkp/pkp-lib [-] Affected Versions: Version 3.3.0-21 and prior versions. Version 3.4.0-9 and prior versions. Version 3.5.0-1 and prior versions. [-] Vulnerability Description: Open… – Read More – Full Disclosure
Posted by malvuln on Dec 27 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2025 Original source: https://malvuln.com/advisory/086f0693f81f6d40460c215717349a1f.txt Malvuln Intelligence Feed: https://intel.malvuln.com/ Contact: malvuln13 () gmail com Media: x.com/malvuln Threat: Backdoor.Win32.Netbus.170 Vulnerability: Insecure Credential Storage Family: Netbus Type: PE32 Attack-pattern TTP: Unsecured Credentials (T1552) MD5: 086f0693f81f6d40460c215717349a1f… – Read More – Full Disclosure
Posted by malvuln on Dec 27 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2025 Original source: https://malvuln.com/advisory/3d9821cbe836572410b3c5485a7f76ca.txt Malvuln Intelligence Feed: https://intel.malvuln.com/ Contact: malvuln13 () gmail com Media: x.com/malvuln Threat: Backdoor.Win32.Poison.jh Vulnerability: Insecure Permissions Description: The malware creates the directory 28463 under C:WindowsSysWOW64, granting Full (F) permissions to the Everyone… – Read More – … Read More “Backdoor.Win32.Poison.jh / Insecure Permissions – Full Disclosure” »
Posted by Egidio Romano on Dec 27 ———————————————————————- PKP-WAL <= 3.5.0-1 (Institution Collector) SQL Injection Vulnerability ———————————————————————- [-] Software Links: https://pkp.sfu.ca https://github.com/pkp/pkp-lib [-] Affected Versions: PKP Web Application Library (aka PKP-WAL or pkp-lib) version 3.4.0-9 and prior versions, and version 3.5.0-1 and prior versions, as used… – Read More – Full Disclosure
Posted by Egidio Romano on Dec 27 ——————————————————————————————— Open Journal Systems <= 3.5.0-1 (NativeXmlIssueGalleyFilter.php) Path Traversal Vulnerability ——————————————————————————————— [-] Software Links: https://pkp.sfu.ca/software/ojs/ https://github.com/pkp/ojs [-] Affected Versions: Version 3.3.0-21 and prior versions. Version 3.4.0-9 and… – Read More – Full Disclosure
Hacker Leaks 2.3M Wired.com Records, Claims 40M-User Condé Nast Breach – Hackread – Cybersecurity News, Data Breaches, AI, and More
A hacker using the alias “Lovely” has leaked what they claim is the personal data of over 2.3… – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
A high-severity security flaw has been disclosed in MongoDB that could allow unauthenticated users to read uninitialized heap memory. The vulnerability, tracked as CVE-2025-14847 (CVSS score: 8.7), has been described as a case of improper handling of length parameter inconsistency, which arises when a program fails to appropriately tackle scenarios where a length field is … Read More “New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory – The Hacker News” »
Everest Ransomware Group Claims Theft of Over 1TB of Chrysler Data – Hackread – Cybersecurity News, Data Breaches, AI, and More
On December 25, while much of the world was observing Christmas, the Everest ransomware group published a new… – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Popular NPM Package lotusbail Exposed as Trojan Stealing WhatsApp Chats – Hackread – Cybersecurity News, Data Breaches, AI, and More
Koi Security uncovers lotusbail, a malicious npm package with 56K downloads that steals WhatsApp messages and installs a persistent backdoor. Learn how to protect your data. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code – The Hacker News
Trust Wallet is urging users to update its Google Chrome extension to the latest version following what it described as a “security incident” that led to the loss of approximately $7 million. The issue, the multi‑chain, non‑custodial cryptocurrency wallet service said, impacts version 2.68. The extension has about one million users, according to the Chrome … Read More “Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code – The Hacker News” »
A China-linked advanced persistent threat (APT) group has been attributed to a highly-targeted cyber espionage campaign in which the adversary poisoned Domain Name System (DNS) requests to deliver its signature MgBot backdoor in attacks targeting victims in Türkiye, China, and India. The activity, Kaspersky said, was observed between November 2022 and November 2024. It has … Read More “China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware – The Hacker News” »
A critical security flaw has been disclosed in LangChain Core that could be exploited by an attacker to steal sensitive secrets and even influence large language model (LLM) responses through prompt injection. LangChain Core (i.e., langchain-core) is a core Python package that’s part of the LangChain ecosystem, providing the core interfaces and model-agnostic abstractions for … Read More “Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection – The Hacker News” »
‘All brakes are off’: Russia’s attempt to rein in illicit market for leaked data backfires – Data and computer security | The Guardian
Russian state has tolerated parallel probiv market for its convenience but now Ukrainian spies are exploiting it Russia is scrambling to rein in the country’s sprawling illicit market for leaked personal data, a shadowy ecosystem long exploited by investigative journalists, police and criminal groups. For more than a decade, Russia’s so-called probiv market – a … Read More “‘All brakes are off’: Russia’s attempt to rein in illicit market for leaked data backfires – Data and computer security | The Guardian” »
ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories – The Hacker News
It’s getting harder to tell where normal tech ends and malicious intent begins. Attackers are no longer just breaking in — they’re blending in, hijacking everyday tools, trusted apps, and even AI assistants. What used to feel like clear-cut “hacker stories” now looks more like a mirror of the systems we all use. This week’s … Read More “ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories – The Hacker News” »
The encrypted vault backups stolen from the 2022 LastPass data breach have enabled bad actors to take advantage of weak master passwords to crack them open and drain cryptocurrency assets as recently as late 2025, according to new findings from TRM Labs. The blockchain intelligence firm said evidence points to the involvement of Russian cybercriminal … Read More “LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds – The Hacker News” »
CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution – The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a security flaw impacting Digiever DS-2105 Pro network video recorders (NVRs) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2023-52163 (CVSS score: 8.8), relates to a case of command injection that allows post-authentication remote code – Read More … Read More “CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution – The Hacker News” »
Fortinet on Wednesday said it observed “recent abuse” of a five-year-old security flaw in FortiOS SSL VPN in the wild under certain configurations. The vulnerability in question is CVE-2020-12812 (CVSS score: 5.2), an improper authentication vulnerability in SSL VPN in FortiOS that could allow a user to log in successfully without being prompted for the … Read More “Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability – The Hacker News” »
Posted by malvuln on Dec 22 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2025 Original source: https://malvuln.com/advisory/b2e50fa38510a5ea8e11f614b1c1d0d5.txt Malvuln Intelligence Feed: https://intel.malvuln.com/ Contact: malvuln13 () gmail com Media: x.com/malvuln Threat: HEUR.Backdoor.Win32.Poison.gen Vulnerability: Arbitrary Code Execution Description: The malware looks for and executes a x32-bit “WININET.dll” PE file in its current directory…. – Read More … Read More “HEUR.Backdoor.Win32.Poison.gen / Arbitrary Code Execution / MVID-2025-0701 – Full Disclosure” »
Posted by malvuln on Dec 22 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2025 Original source: https://malvuln.com/advisory/b2e50fa38510a5ea8e11f614b1c1d0d5.txt Malvuln Intelligence Feed: https://intel.malvuln.com/ Contact: malvuln13 () gmail com Media: x.com/malvuln Threat: HEUR.Backdoor.Win32.Poison.gen Vulnerability: Arbitrary Code Execution Description: The malware looks for and executes a x32-bit “WININET.dll” PE file in its current directory…. – Read More … Read More “HEUR.Backdoor.Win32.Poison.gen / Arbitrary Code Execution / MVID-2025-0701 – Full Disclosure” »
Posted by malvuln on Dec 22 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2025 Original source: https://malvuln.com/advisory/b2e50fa38510a5ea8e11f614b1c1d0d5.txt Malvuln Intelligence Feed: https://intel.malvuln.com/ Contact: malvuln13 () gmail com Media: x.com/malvuln Threat: HEUR.Backdoor.Win32.Poison.gen Vulnerability: Arbitrary Code Execution Description: The malware looks for and executes a x32-bit “WININET.dll” PE file in its current directory…. – Read More … Read More “HEUR.Backdoor.Win32.Poison.gen / Arbitrary Code Execution / MVID-2025-0701 – Full Disclosure” »
Posted by malvuln on Dec 22 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2025 Original source: https://malvuln.com/advisory/6c0eda1210da81b191bd970cb0f8660a.txt Malvuln Intelligence Feed: https://intel.malvuln.com/ Contact: malvuln13 () gmail com Media: x.com/malvuln Threat: Backdoor.Win32.ControlTotal.t Vulnerability: Insecure Credential Storage Description: The malware listens on TCP port 2032 and requires authentication. The password “jdf4df4vdf”… – Read More – Full … Read More “Backdoor.Win32.ControlTotal.t / Insecure Credential Storage / MVID-2025-0702 – Full Disclosure” »
Posted by malvuln on Dec 22 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2025 Original source: https://malvuln.com/advisory/6c0eda1210da81b191bd970cb0f8660a.txt Malvuln Intelligence Feed: https://intel.malvuln.com/ Contact: malvuln13 () gmail com Media: x.com/malvuln Threat: Backdoor.Win32.ControlTotal.t Vulnerability: Insecure Credential Storage Description: The malware listens on TCP port 2032 and requires authentication. The password “jdf4df4vdf”… – Read More – Full … Read More “Backdoor.Win32.ControlTotal.t / Insecure Credential Storage / MVID-2025-0702 – Full Disclosure” »
Posted by malvuln on Dec 22 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2025 Original source: https://malvuln.com/advisory/6c0eda1210da81b191bd970cb0f8660a.txt Malvuln Intelligence Feed: https://intel.malvuln.com/ Contact: malvuln13 () gmail com Media: x.com/malvuln Threat: Backdoor.Win32.ControlTotal.t Vulnerability: Insecure Credential Storage Description: The malware listens on TCP port 2032 and requires authentication. The password “jdf4df4vdf”… – Read More – Full … Read More “Backdoor.Win32.ControlTotal.t / Insecure Credential Storage / MVID-2025-0702 – Full Disclosure” »
Cybersecurity researchers have discovered a new variant of a macOS information stealer called MacSync that’s delivered by means of a digitally signed, notarized Swift application masquerading as a messaging app installer to bypass Apple’s Gatekeeper checks. “Unlike earlier MacSync Stealer variants that primarily rely on drag-to-terminal or ClickFix-style techniques, this sample adopts a more – … Read More “New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper – The Hacker News” »
The SEC has charged several crypto platforms and investment clubs for defrauding US investors of more than $14m – Read More –
A coordinated wave of fake online job ads targeting the Middle East and North Africa has been uncovered, exploiting remote work trends – Read More –
The fraudulent investment scheme known as Nomani has witnessed an increase by 62%, according to data from ESET, as campaigns distributing the threat have also expanded beyond Facebook to include other social media platforms, such as YouTube. The Slovak cybersecurity company said it blocked over 64,000 unique URLs associated with the threat this year. A … Read More “Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media – The Hacker News” »
Eurostar Accused Researchers of Blackmail for Reporting AI Chatbot Flaws – Hackread – Cybersecurity News, Data Breaches, AI, and More
Researchers discovered critical flaws in Eurostar’s AI chatbot including prompt injection, HTML injection, guardrail bypass, and unverified chat IDs – Eurostar later accused them of blackmail. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Every year, cybercriminals find new ways to steal money and data from businesses. Breaching a business network, extracting sensitive data, and selling it on the dark web has become a reliable payday. But in 2025, the data breaches that affected small and medium-sized businesses (SMBs) challenged our perceived wisdom about exactly which types of businesses … Read More “Attacks are Evolving: 3 Ways to Protect Your Business in 2026 – The Hacker News” »
NIST and MITRE are collaboratively launching two centers to advance AI security for US manufacturing and critical infrastructure – Read More –
SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips – The Hacker News
The U.S. Securities and Exchange Commission (SEC) has filed charges against multiple companies for their alleged involvement in an elaborate cryptocurrency scam that swindled more than $14 million from retail investors. The complaint charged crypto asset trading platforms Morocoin Tech Corp., Berge Blockchain Technology Co., Ltd., and Cirkor Inc., as well as investment clubs AI … Read More “SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips – The Hacker News” »
French postal service warns of “major network incident” just before Christmas – Read More –
ServiceNow is set to acquire Armis for $7.75bn in a cash-only deal expected to close in the second half of 2026 – Read More –
A vulnerability has been discovered in WatchGuard Fireware OS, which could allow for unauthenticated arbitrary code execution. WatchGuard Fireware is the proprietary operating system that powers WatchGuard’s Firebox appliances. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to execute arbitrary code on the system. – Read More – Cyber Security Advisories – … Read More “A Vulnerability in WatchGuard Fireware OS Could Allow for Arbitrary Code Execution. – Cyber Security Advisories – MS-ISAC” »
The global acceleration of privacy regulation DPDP Act, GDPR, DIFC DP Law, PDPL (UAE), and evolving sectoral mandates has… The post Step-by-Step Guide to Implementing 72-Hour Breach Reporting appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Apple has been fined €98.6 million ($116 million) by Italy’s antitrust authority after finding that the company’s App Tracking Transparency (ATT) privacy framework restricted App Store competition. The Italian Competition Authority (Autorità Garante della Concorrenza e del Mercato, or AGCM) said the company’s “absolute dominant position” in app distribution allowed it to “unilaterally impose” – … Read More “Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition – The Hacker News” »
New MacSync Stealer Disguised as Trusted Mac App Hunts Saved Passwords – Hackread – Cybersecurity News, Data Breaches, AI, and More
Jamf security experts have found a new version of MacSync Stealer. Disguised as a zk-call app, it uses official notarization to bypass security and steal your saved passwords. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
A newly discovered macOS malware mimics legitimate apps code-signed and notarized by Apple – Read More –
Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that come with capabilities to intercept traffic and capture user credentials. The extensions are advertised as a “multi-location network speed test plug-in” for developers and foreign trade personnel. Both the browser add-ons are available for download … Read More “Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites – The Hacker News” »
Is Santa Claus real? This Christmas special of The AI Fix podcast sets out to answer that question in the most sensible way possible: by consulting chatbots, Google’s festive killjoys, and the laws of relativistic physics. Your hosts unwrap a festive grab-bag of AI absurdity as Waymo self-driving taxis run over a beloved San Francisco … Read More “The AI Fix #82: Santa Claus doesn’t exist (according to AI) – Graham Cluley” »
A University of Phoenix data breach affecting nearly 3.5 million individuals has been claimed by the Clop ransomware collective – Read More –
ServiceNow has agreed to buy cybersecurity firm Armis for $7.75 billion in cash, a deal that would push the enterprise software company deeper into a fast-growing corner of security focused on tracking and reducing “exposure” across sprawling networks of connected devices. The companies said Tuesday that combining ServiceNow’s workflow and risk products with Armis’ asset … Read More “ServiceNow agrees to buy cyber firm Armis for $7.75B – CyberScoop” »
Ransomware Hits Romanian Water Authority, 1000 Systems Knocked Offline – Hackread – Cybersecurity News, Data Breaches, AI, and More
Romania’s national water authority, Romanian Waters, was hit by a major ransomware attack affecting 1,000 systems but dams remain safe. Learn how authorities are fighting back without paying the ransom. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Infosecurity has selected some of the key ransomware statistics for 2025 – Read More –
Agentic AI browsers like OpenAI’s Atlas have debuted to major fanfare, and the enthusiasm is warranted. These tools automate web browsing to close the gap between what you want to accomplish and getting it done. Rather than manually opening multiple tabs, you can simply tell the browser what you need. Ask it to file a … Read More “How to determine if agentic AI browsers are safe enough for your enterprise – CyberScoop” »
Passwd is designed specifically for organizations operating within Google Workspace. Rather than competing as a general consumer password manager, its purpose is narrow, and business-focused: secure credential storage, controlled sharing, and seamless Workspace integration. The platform emphasizes practicality over feature overload, aiming to provide a reliable system for teams that already rely – Read More … Read More “Passwd: A walkthrough of the Google Workspace Password Manager – The Hacker News” »
A law enforcement operation coordinated by INTERPOL has led to the recovery of $3 million and the arrest of 574 suspects by authorities from 19 countries, amidst a continued crackdown on cybercrime networks in Africa. The coordinated effort, named Operation Sentinel, took place between October 27 and November 27, 2025, and mainly focused on business … Read More “INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty – The Hacker News” »
The Middle East and Africa region is moving through a fast digital shift. This shift covers national identity programs,… The post AI-Powered Attacks in MEA: Deepfakes, Automation & New Threat Vectors appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd