Aggregator
CVE-2024-46797 | Linux Kernel up to 6.6.50/6.10.9 queued_spin_lock_slowpath initialization (d84ab6661e8d/f06af737e4be/734ad0af3609 / Nessus ID 212724)
CVE-2024-46793 | Linux Kernel up to 6.10.9 Intel COMP_DUMMY null pointer dereference (85cda5b040bd/0cc65482f5b0 / Nessus ID 212724)
CVE-2024-46794 | Linux Kernel up to 6.1.109/6.6.50/6.10.9 tdx mmio_read initialization (Nessus ID 208099 / WID-SEC-2024-2173)
Latest BreachForums Reboot Tied to Fake ShinyHunters Admin
Drama continues fast and furious in BreachForums land, as someone claiming to be part of the ShinyHunters crime group said they've rebooted the long-running and oft-disrupted forum yet again. But an official ShinyHunters channel denied the group having involvement in any such reboots.
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2026-35616 - Fortinet FortiClient EMS Improper Access Control Vulnerability
This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Пароль? Какой пароль? Fortinet разрешила всем желающим покопаться в чужих серверах
How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers
Каждая пятая компания в России уже взломана, но живёт как ни в чём не бывало
Google’s Bug Bounty Program Hits All-Time High With $17 Million in 2025 Payouts
Google’s Vulnerability Reward Program (VRP) celebrated its 15th anniversary in 2025 by breaking every payout record in its history. The tech giant awarded a staggering $17 million to external security researchers worldwide, representing a massive 40% surge compared to 2024. Over 700 ethical hackers from across the globe successfully identified and responsibly disclosed vulnerabilities, proving […]
The post Google’s Bug Bounty Program Hits All-Time High With $17 Million in 2025 Payouts appeared first on Cyber Security News.
6th April – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 30th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The European Commission, the European Union’s executive body, has confirmed a data breach after its Europa.eu platform was compromised through a third-party exchange linked to the Trivy supply chain attack. The incident […]
The post 6th April – Threat Intelligence Report appeared first on Check Point Research.
Apache Traffic Server Vulnerabilities Let Attackers Trigger DoS Attack
The Apache Software Foundation has released emergency security updates to address two severe vulnerabilities in the Apache Traffic Server (ATS). ATS operates as a high-performance web proxy cache that improves network efficiency and handles massive volumes of enterprise web traffic. These newly discovered flaws stem from how the server processes HTTP requests with message bodies. […]
The post Apache Traffic Server Vulnerabilities Let Attackers Trigger DoS Attack appeared first on Cyber Security News.