Friday, November 14, 2025
Homecybersecurity

cybersecurity

Citrix NetScaler ADC and Gateway Vulnerability Exposes Systems To Cross-Site Scripting Attacks

In a recent security bulletin, Cloud Software Group (formerly Citrix) disclosed a medium-severity vulnerability affecting NetScaler ADC and NetScaler Gateway products. Identified as CVE-2025-12101, this cross-site scripting (XSS) flaw could allow attackers to inject malicious scripts into web pages viewed by users, potentially leading...

SecureVibes – AI Tool Detects Vulnerabilities In 11 Languages Using Claude AI Agents

In the era of "vibecoding," where developers leverage AI to prototype applications rapidly, security often takes a back seat to speed. Enter SecureVibes, an innovative open-source tool released in October 2025 by developer Anshuman Bhartiya, designed to bridge this gap. Built on Anthropic's Claude...

Vulnerabilities In GitHub Copilot and Visual Studio Enable Attackers To Bypass Security Features

In the fast-evolving world of AI-assisted coding, tools like GitHub Copilot have become indispensable for developers, streamlining workflows within environments such as Microsoft Visual Studio Code (VS Code). However, a newly disclosed vulnerability in the VS Code CoPilot Chat Extension underscores the risks of...

Custom GPTs Exploit SSRF Vulnerability To Hack ChatGPT and Expose Secrets

In the fast-evolving world of AI, security flaws can turn helpful tools into gateways for serious breaches. A recent discovery highlights a server-side request forgery (SSRF) vulnerability in ChatGPT's "Actions" feature, which affects custom GPTs in OpenAI's popular chatbot. This flaw allows attackers to...

65% Of Top AI Firms Expose Verified Secrets On GitHub, Including Keys And Tokens

The study targeted 50 prominent AI companies from the Forbes AI 50 list, excluding those without a GitHub presence. Shockingly, 65% nearly two-thirds showed verified secret leaks. These include API keys, tokens, and credentials for platforms like Perplexity, Weights & Biases, Groq, and NVIDIA,...

Hackers Abuse Active Directory Sites For Domain Compromise

Designed to optimize network performance in large organizations, have emerged as a overlooked vector for domain compromise. Security researchers at Synacktiv recently highlighted how attackers can exploit access control lists (ACLs) on site objects to escalate privileges and infiltrate entire domains. This technique, detailed...