Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers – Go Health Pro

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers – Go Health Pro

May 06, 2025Ravie LakshmananVulnerability / Mobile Security Google has released its monthly security updates for Android with fixes for 46 security flaws, including one vulnerability that it said has been exploited in the wild. The vulnerability in question is CVE-2025-27363 (CVSS score: 8.1), a high-severity flaw in the System component that could lead to local … Read more

Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers – Go Health Pro

Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers – Go Health Pro

May 01, 2025Ravie LakshmananMalware / Web Skimming Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as a security plugin. The plugin, which goes by the name “WP-antymalwary-bot.php,” comes with a variety of features to maintain access, hide itself from the admin dashboard, and execute remote code. “Pinging … Read more

RSAC Fireside Chat: Attackers are exploiting gaps in business logic created by proliferation of APIs – Go Health Pro

RSAC Fireside Chat: Attackers are exploiting gaps in business logic created by proliferation of APIs – Go Health Pro

By Byron V. Acohido APIs have become foundational to digital business operations, serving as the behind-the-scenes glue that connects apps, platforms and partners. Related: OWASP’s Top 10 Web App Security Risks But this growing reliance has opened a new front in cybersecurity—one where attackers are quietly exploiting weaknesses buried deep in business logic. In this … Read more

How attackers exploit Microsoft 365 from the inside – and what to do about it – Go Health Pro

How attackers exploit Microsoft 365 from the inside – and what to do about it – Go Health Pro

COMMENTARY: The shift to cloud-based email has been a game changer for organizations worldwide, with Microsoft 365 (M365) emerging as a dominant platform for business communication.However, this widespread adoption has also made M365 an attractive target for cybercriminals, who now leverage the platform itself to launch highly-deceptive attacks. Unlike traditional phishing schemes that rely on … Read more

Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems – Go Health Pro

Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems – Go Health Pro

Mar 19, 2025Ravie LakshmananVulnerability / Network Security Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control and Data Acquisition (SCADA) system used in operational technology (OT) environments, that could allow malicious actors to take control of susceptible systems. “These vulnerabilities, if exploited, could grant unauthorized access to industrial control … Read more