Summary: This content discusses the proactive approach taken by Protect AI to identify and address security risks in AI systems, specifically focusing on vulnerabilities in the tools used to build machine learning models in the OSS AI/ML supply chain.

Threat Actor: N/A

Victim: N/A

Key Point :

Protect AI’s huntr is the world’s first AI/ML bug bounty program, where a community of 15,000+ members hunts for vulnerabilities in the OSS AI/ML supply chain.…
Read More

Threat Actor: Unknown | Unknown Victim: Italian Internet Service Provider | Italian Internet Service Provider Price: Not specified Exfiltrated Data Type: Critical data from 20 different databases

Additional Information :

The threat actor claims to be selling unauthorized access to the database of a major Italian Internet Service Provider through an SQL Injection vulnerability.…
Read More

Summary: Multiple security vulnerabilities have been found in the WooCommerce Amazon Affiliates (WZone) plugin, posing significant security risks for WordPress site owners and bloggers using the plugin to monetize their websites via the Amazon affiliate program.

Threat Actor: Unknown | Unknown Victim: WordPress site owners and bloggers using the WooCommerce Amazon Affiliates (WZone) plugin | WordPress site owners and bloggers using the WooCommerce Amazon Affiliates (WZone) plugin

Key Point :

The WooCommerce Amazon Affiliates (WZone) plugin, developed by AA-Team, has multiple security vulnerabilities that impact all tested versions, including a critical authenticated arbitrary option update vulnerability.…
Read More

Summary: The content discusses the critical vulnerabilities in several WordPress plugins and the urgent need for users to take action to protect their websites from unauthorized access and exploitation by malicious actors.

Threat Actor: N/A

Victim: N/A

Key Point :

The Cyber Security Agency of Singapore has issued a critical alert regarding vulnerabilities in multiple WordPress plugins, emphasizing the importance of immediate action to address these risks.…
Read More

Summary: Cisco has addressed a vulnerability in the web-based management interface of the Firepower Management Center (FMC) Software, which could allow an attacker to conduct SQL injection attacks and potentially gain root privileges.

Threat Actor: N/A

Victim: Cisco

Key Point:

Cisco has patched a vulnerability in its Firepower Management Center (FMC) Software that could allow an attacker to conduct SQL injection attacks.…
Read More

Summary: Hackers are targeting WordPress sites with an outdated version of the LiteSpeed Cache plugin to create administrator users and gain control of the websites.

Threat Actor: Unknown | Unknown Victim: WordPress sites | WordPress

Key Point :

Hackers are exploiting an unauthenticated cross-site scripting flaw in older versions of the LiteSpeed Cache plugin for WordPress.…
Read More

Summary: CISA and the FBI are urging software companies to address path traversal security vulnerabilities in their products to prevent attackers from exploiting them and gaining unauthorized access or control over critical files and systems.

Threat Actor: Attackers exploiting path traversal vulnerabilities

Victim: Software companies

Key Point :

Path traversal vulnerabilities, also known as directory traversal, can be exploited by attackers to manipulate file paths and access sensitive data or execute malicious code.…
Read More

Summary: Attackers are increasingly exploiting vulnerabilities in computer systems to gain initial network access, with a 6% increase in intrusions through vulnerability exploitation in 2023, according to Mandiant’s M-Trends 2024 Report. Additionally, researchers observed a rise in the exploitation of zero-day vulnerabilities, with Chinese cyber espionage groups being the most prolific attackers in this regard.…

Read More

Summary: The WordPress plugin Forminator, developed by WPMU DEV, is affected by multiple vulnerabilities, including a flaw that allows unrestricted file uploads to the server.

Threat Actor: Remote attackers

Victim: WordPress sites using the Forminator plugin

Key Point :

A critical vulnerability (CVE-2024-28890) allows remote attackers to upload malicious code on WordPress sites using the Forminator plugin.…
Read More

This video provides a comprehensive tutorial on how hackers can gain unauthorized access to websites, specifically WordPress sites, without needing passwords. Here are the essential points covered:

🔓 Introduction to WordPress Security: The presenter begins by illustrating the ubiquity of WordPress as a content management system, noting that a significant portion of websites on the internet use WordPress.…
Read More

Threat Actor: Unknown | Unknown Victim: Hidalgo Intelligence Center and Universidad Autonoma Metropolitana Mexico – Unidad Azcapotzalco | Hidalgo Intelligence Center and Universidad Autonoma Metropolitana Mexico – Unidad Azcapotzalco Price: Unknown Exfiltrated Data Type: Confidential files related to investigations, vehicle inquiries, real-time police reports, user reports with multimedia content, and database names.…

Read More

Summary: Cloud security provider Wiz discovered two critical architecture flaws in generative AI models uploaded to Hugging Face, posing risks to AI-as-a-service providers.

Threat Actor: Wiz Research | Wiz Research Victim: Hugging Face | Hugging Face

Key Points:

Wiz researchers found two flaws in generative AI models uploaded to Hugging Face: shared inference infrastructure takeover risk and shared CI/CD takeover risk.…
Read More

Summary: A premium WordPress plugin called LayerSlider is vulnerable to unauthenticated SQL injection, which could allow attackers to extract sensitive data from the site’s database.

Threat Actor: Unknown | LayerSlider Victim: WordPress sites using the LayerSlider plugin | LayerSlider

Key Point :

A premium WordPress plugin named LayerSlider is vulnerable to unauthenticated SQL injection, requiring admins to prioritize applying security updates for the plugin.…
Read More