Aggregator
CVE-2025-8735 | GNU cflow up to 1.8 Lexer c.c yylex null pointer dereference
漏洞通告 | Jenkins Git Parameter插件远程代码执行漏洞
ECScape: Exploiting ECS Protocol on EC2 to Exfiltrate Cross-Task IAM and Execution Role Credentials
A sophisticated technique dubbed “ECScape” that allows malicious containers running on Amazon Elastic Container Service (ECS) to steal AWS credentials from other containers sharing the same EC2 instance. The discovery highlights critical isolation weaknesses in multi-tenant ECS deployments and underscores the security advantages of AWS Fargate’s micro-VM architecture. The technique, developed by security researcher Naor […]
The post ECScape: Exploiting ECS Protocol on EC2 to Exfiltrate Cross-Task IAM and Execution Role Credentials appeared first on Cyber Security News.
Bouygues Telecom Data Breach Exposes 6.4 Million Customer Records
INC
You must login to view this content
Ransomware: Still Dangerous After All These Years
Ransomware: Still Dangerous After All These Years
Ransomware isn’t dying — it’s evolving, swapping encryption for aggressive extortion as attacks and data theft hit record highs.
The post Ransomware: Still Dangerous After All These Years appeared first on Security Boulevard.
SonicWall SMA 500设备漏洞深度剖析
SonicWall SMA 500设备漏洞深度剖析
Submit #622329: GNU cflow cflow cflow (GNU cflow) the newest master (0a19319e282506ff88d19e630380cd5069e893ed ) in cflow.git - GNU cflow Buffer Overflow [Accepted]
Submit #622328: GNU cflow cflow cflow (GNU cflow) the newest master (0a19319e282506ff88d19e630380cd5069e893ed ) in cflow.git - GNU cflow Null Pointer Dereference [Accepted]
Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen $1 Million from Victims
A sophisticated cybercriminal operation known as GreedyBear has orchestrated one of the most extensive cryptocurrency theft campaigns to date, deploying over 650 malicious tools across multiple attack vectors to steal more than $1 million from unsuspecting victims. Unlike traditional threat groups that typically specialize in single attack methods, GreedyBear has adopted an industrial-scale approach, simultaneously […]
The post Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen $1 Million from Victims appeared first on Cyber Security News.