Category: Cybersecurity News
-
Security Advisory on Critical Vulnerability Chain in NVIDIA Triton Inference Server
Recent research by Wiz Security has identified a significant chain of vulnerabilities within NVIDIA’s Triton Inference Server, a widely used platform for deploying AI models at scale. When exploited in sequence, these flaws could enable unauthenticated attackers to gain full control over affected servers, leading to remote code execution (RCE). The vulnerabilities, assigned CVE (Common
-
Mozilla Issues Warning About Phishing Attacks Targeting Firefox Add-on Developers
The Mozilla Foundation, creators of the Firefox browser, has issued an important warning for developers and users about a new phishing campaign targeting Mozilla Add-ons (AMO) accounts. These fake emails that appear to be from Mozilla or AMO, often claiming that your account needs an update or verification to continue accessing developer features. These messages
-
Critical Security Vulnerabilities Found in Dahua Hero Smart Cameras
Bitdefender has identified critical security vulnerabilities in the firmware of the Dahua Hero C1 (DH-H4C) smart camera series. These vulnerabilities, affecting the device’s ONVIF protocol and file upload handlers, could allow unauthenticated attackers to remotely execute arbitrary commands, potentially taking full control of the device. The vulnerabilities were verified on a Dahua Hero C1 (DH-H4C)
-
Pi-hole Reports Security Breach Exposing Donor Data
Pi-hole, a trusted and widely adopted open-source network security solution, experienced a security incident involving the inadvertent exposure of user information submitted through its donation page. The breach was limited to names and email addresses; no payment details or verified personal information were compromised. The exposure occurred when donor names and email addresses entered via
-
Vulnerability In WordPress AI Engine Plugin Affects 100k+ Sites
WordPress sites using the AI Engine plugin should be aware of a recently discovered security vulnerability that could allow malicious actors to upload arbitrary files and potentially take control of affected websites. On July 18th, 2025, a security report submitted to Wordfence revealed an Arbitrary File Upload vulnerability in the AI Engine plugin, which is
-
CISA Releases Thorium, a Security Platform for Automating File Analysis
The Cybersecurity and Infrastructure Security Agency (CISA), working alongside Sandia National Laboratories, has announced that Thorium is now available for public use. This platform is designed to help cybersecurity teams automate file analysis and improve the efficiency of their threat detection workflows. Scalable Solution for Modern Cybersecurity Challenges Thorium is a distributed platform that brings
-
Hidden Vulnerabilities in Browser-Based Generative AI Usage
Users and organizations are increasingly rely on generative AI (artificial intelligence) tools to streamline workflows, enhance productivity, and handle sensitive data. But new security threats are emerging, some of which could have serious consequences. Recent research highlights a growing vulnerability with AI usage and browser extensions, which can be exploited to manipulate prompts and exfiltrate
-
New Choicejacking Attack Exploits Charging Stations to Steal Data from Phones
Public charging stations have always been considered a convenient way to power up devices on the go. However, recent cybersecurity research reveals a disturbing new threat—called Choicejacking—that turns these stations into data-stealing traps, often without the user even realizing it. For years, “juice jacking” has been a known security concern. Hackers infected charging stations or
Categories:
Have any comments or suggestions? Feel free to let us know!
