WordPress, Perplexity, Apache & macOS Targeted | Android & Adobe Patches | Oracle & Sensata Technologies Data Breaches
10 Security Flaws in Perplexity AI's Android Chatbot App
Researchers describe the company’s artificial intelligence chatbot as less secure than both ChatGPT and DeepSeek.
OttoKit WordPress Plugin Vulnerability Actively Exploited in the Wild
A vulnerability in the OttoKit WordPress plugin, which has over 100,000 active installations, is being actively exploited in the wild. According to WordPress security firm Defiant, threat actors are leveraging this flaw, potentially putting numerous websites at risk of full compromise.
Critical Vulnerability in WordPress Plugin Exploited Just 4 Hours After Disclosure
A critical vulnerability in the SureTriggers WordPress plugin has been actively exploited within just four hours of its public disclosure.
Android Security Update: Google Patches Two Critical Zero-Day Flaws
Google has released patches for 62 vulnerabilities, including two that have been actively exploited in the wild.
Adobe Patches 11 Critical ColdFusion Vulnerabilities Among 30 Security Flaws
Adobe has issued security updates to address a new set of vulnerabilities, including several critical-severity flaws in ColdFusion versions 2025, 2023, and 2021, which could lead to arbitrary file reading and code execution.
Apache Roller Vulnerability Allowed Unauthorized Access to Blog Sites
A critical security vulnerability in Apache Roller, tracked as CVE-2025-24859, has been discovered, allowing attackers to retain unauthorized access to blog systems even after password changes.
Rapid7 Uncovers RCE Path in Ivanti VPN Appliance Following Silent Patch
CVE-2025-22457, a critical vulnerability in Ivanti’s Connect Secure VPN appliances, has already been exploited by a China-linked hacking group known for targeting edge network devices. Security researchers at Rapid7 have publicly detailed a path to remote code execution.
Hackers Allegedly Renting Full System Control Malware to Target macOS Users
A new macOS malware-as-a-service (MaaS) threat named iNARi Loader has emerged, offering cybercriminals full system control over Apple devices
Nissan Leaf Vulnerabilities Enable Remote Spying and Physical Control Exploits
Researchers have discovered vulnerabilities that could be exploited to remotely take control of a Nissan Leaf’s functions, including its physical controls.
SonicWall Patches High-Severity NetExtender Vulnerability
SonicWall has released patches for three vulnerabilities in its NetExtender for Windows software, including one high-severity flaw. The fixes were announced this week to address potential security risks.
Malicious NPM Packages Exploit Cryptocurrency and PayPal Users
Threat actors are distributing malicious NPM packages designed to steal PayPal credentials and hijack cryptocurrency transactions, targeting users' sensitive information and funds.
Recent Data Breaches & Ransomware Attacks
Data Breaches and Ransomeware attack Including Malaysian Airport's, SEMrush, Numotion & Daisy Cloud Hacker Exposes Credentials Across a Wide Range of Services
10 Security Flaws in Perplexity AI's Android Chatbot App
Researchers from Appknox have uncovered ten security vulnerabilities in the Android version of Perplexity AI's chatbot application, highlighting significant concerns about the app's mobile security posture. This discovery suggests that Perplexity's Android app is less secure compared to other AI chatbots like ChatGPT and DeepSeek.
The identified vulnerabilities in Perplexity's Android app include:
These findings underscore the importance of comprehensive security assessments for mobile applications, especially those leveraging advanced AI technologies. Organizations are advised to prioritize mobile app security alongside the development of their AI models to prevent potential exploitation of such vulnerabilities.
OttoKit WordPress Plugin Vulnerability Actively Exploited in the Wild
A critical vulnerability in the OttoKit WordPress plugin, formerly known as SureTriggers, is being actively exploited, putting over 100,000 websites at risk of full compromise.
The flaw arises from a missing check for empty values in a function responsible for permission verification. If the plugin hasn't been configured with an API key, an attacker can exploit this oversight by sending a request with an empty secret key, which the system erroneously accepts. This grants access to the plugin's REST API endpoint, enabling the attacker to perform various administrative actions.
Potential Exploitation
Once access is gained, attackers can:
Defiant, a WordPress security firm, warns that this vulnerability can lead to complete control over the affected site, allowing attackers to manipulate it as a legitimate administrator would.
Website administrators using OttoKit should act promptly to secure their sites against this actively exploited vulnerability.
Critical Vulnerability in WordPress Plugin Exploited Just 4 Hours After Disclosure
A critical vulnerability in the SureTriggers WordPress plugin (versions ≤1.0.78) has been actively exploited within just four hours of its public disclosure. This flaw allows unauthenticated attackers to create administrator accounts on vulnerable sites, potentially compromising over 100,000 installations worldwide.
The flaw arises from a missing check for empty values in a function responsible for permission verification. If the plugin hasn't been configured with an API key, an attacker can exploit this oversight by sending a request with an empty secret key, which the system erroneously accepts. This grants access to the plugin's REST API endpoint, enabling the attacker to perform various administrative actions.
Android Security Update: Google Patches Two Critical Zero-Day Flaws
Google has patches for 62 vulnerabilities, two of which it said have been exploited in the wild.
The two high-severity vulnerabilities are listed below -
Google has released its April 2025 Android security update, addressing 62 vulnerabilities, including two critical zero-day flaws that have been actively exploited in targeted attacks.
The update also patches 60 other security issues across various components, including the Android Framework and System. These vulnerabilities range from information disclosure to remote code execution risks.
Adobe Patches 11 Critical ColdFusion Vulnerabilities Among 30 Security Flaws
Adobe has released critical security updates for ColdFusion versions 2025, 2023, and 2021, addressing 30 vulnerabilities, including 11 rated as critical. These flaws could lead to arbitrary file reads, code execution, and security feature bypasses.
Recommended by LinkedIn
Additionally, patches have been released for other Adobe products, including After Effects, Media Encoder, Bridge, Premiere Pro, Photoshop, Animate, and FrameMaker, to fix out-of-bounds write and heap-based buffer overflow bugs that could lead to arbitrary code execution
Apache Roller Vulnerability Allowed Unauthorized Access to Blog Sites
A critical security vulnerability has been identified in Apache Roller, a Java-based blogging platform, that could allow attackers to maintain unauthorized access to blog systems even after password changes. The vulnerability, tracked as CVE-2025-24859, has received the highest possible CVSS v4 score of 10, indicating severe risk to affected systems.
The vulnerability creates a scenario where standard security practices become ineffective. When credentials are suspected of being compromised, the immediate response is typically to change passwords – but with this flaw, attackers who have already established sessions can continue operating within the system unimpeded.
Rapid7 Uncovers RCE Path in Ivanti VPN Appliance Following Silent Patch
Security researchers at Rapid7 have publicly disclosed a method to achieve remote code execution (RCE) on Ivanti's Connect Secure VPN appliances, highlighting a critical vulnerability that has already been exploited in the wild.
The flaw allows attackers to manipulate the length of the "X-Forwarded-For" header value, triggering a buffer overflow that can overwrite critical parts of the stack, leading to remote code execution.
Ivanti's Response
Upon learning of the active exploitation, Ivanti acknowledged the severity of the vulnerability and urged customers to update to Connect Secure version 22.7R2.6, which addresses the issue. The company emphasized that the vulnerability, initially thought to be non-exploitable, has been proven to be exploitable through sophisticated means.
Hackers Allegedly Renting Full System Control Malware to Target macOS Users
A new macOS malware-as-a-service (MaaS) threat named iNARi Loader has emerged, offering cybercriminals full system control over Apple devices. Advertised on underground forums, this sophisticated malware combines remote desktop capabilities with advanced data exfiltration techniques, posing a significant risk to macOS users.
Key Features of iNARi Loader
Rising Threat to macOS Users
The emergence of iNARi Loader marks a significant escalation in macOS-targeted threats. In recent years, multiple infostealer families—such as MacStealer, Pureland, Atomic, RealStealer, MetaStealer, and Banshee—have been documented, primarily targeting sensitive information like Keychain passwords, browser data, cryptocurrency wallets, and personal files. The addition of remote desktop capabilities in iNARi Loader provides attackers with persistent control over compromised systems.
Nissan Leaf Vulnerabilities Enable Remote Spying and Physical Control Exploits
Researchers from PCAutomotive have uncovered a series of critical vulnerabilities in the second-generation Nissan Leaf (model year 2020), revealing that attackers could remotely access and control various vehicle functions, including while the car is in motion.
Presented at Black Hat Asia 2025, the research demonstrated how the Leaf's infotainment system's Bluetooth capabilities could be exploited to infiltrate the car's internal network. Once inside, attackers could escalate privileges and establish a command-and-control (C&C) channel over cellular communications, allowing persistent and stealthy access to the vehicle over the internet.
The vulnerabilities enabled attackers to:
These security flaws have been assigned eight CVE identifiers: CVE-2025-32056 through CVE-2025-32063. Disclosure to Nissan began in August 2023, with the company confirming the findings in January 2024. However, the CVEs were only recently assigned.
In response, a Nissan spokesperson acknowledged the research but declined to provide specific details about countermeasures, citing security reasons.
SonicWall Patches High-Severity NetExtender Vulnerability
SonicWall has released critical security updates for its NetExtender VPN client for Windows, addressing three vulnerabilities, including a high-severity flaw that could allow authenticated attackers to alter application configurations.
These vulnerabilities affect both 32-bit and 64-bit versions of the NetExtender Windows client and have been resolved in version 10.3.2. SonicWall has confirmed that the Linux version of NetExtender is not impacted.
Malicious NPM Packages Exploit Cryptocurrency and PayPal Users
Threat actors have been publishing malicious NPM packages to steal the information and funds of PayPal and cryptocurrency wallet users.
PayPal Credential Theft via NPM Packages
Fortinet discovered that PayPal users have been targeted with multiple information-stealing packages that were likely created in early March by a threat actor known as tommyboy_h1 and tommyboy_h2. These packages used PayPal-related themes such as oauth2-paypal and buttonfactoryserv-paypal to trick developers into installing them. To evade detection, a preinstall hook is used in the malicious packages.
Cryptocurrency Wallet Hijacking
Users of the cryptocurrency wallet applications Atomic Wallet and Exodus have been targeted with a malicious NPM package designed to hijack fund transfers and divert them to crypto addresses controlled by threat actors. Named pdf-to-office and published in March, the package poses as a library that supports the conversion of PDF files to Microsoft Office documents.
The malicious code was also seen sending a ZIP archive to a remote server, suggesting that it could also harvest sensitive information from an infected system.
Incomplete NVIDIA Patch Leaves CVE-2024-0132 Vulnerable to Container Escapes
Cybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk.
The original vulnerability CVE-2024-0132 (CVSS score: 9.0) is a Time-of-Check Time-of-Use (TOCTOU) vulnerability that could lead to a container escape attack and allow for unauthorized access to the underlying host.
Recent Data Breaches & Ransomware Attacks
Hackers Breach Morocco’s Social Security Database
Operations of Sensor Giant Sensata Disrupted by Ransomware Attack
Oracle Faces Mounting Criticism After Data Breach
1.6 Million People Impacted by Data Breach at Laboratory Services Cooperative
These incidents highlight the ongoing risks to both personal data and operational continuity in various sectors, stressing the importance of cybersecurity vigilance and timely incident response.
I appreciate this, Noor Worth reading
Thanks for sharing, Noor