Aggregator
CVE-2025-8081 | Elementor Plugin up to 3.30.2 on WordPress Import_Images::import path traversal (EUVD-2025-24220)
CVE-2025-36023 | IBM Cloud Pak for Business Automation up to 24.0.0 IF005/24.0.1 IF002 authorization (EUVD-2025-23987)
CVE-2025-36119 | IBM i 7.3/7.4/7.5/7.6 Digital Certificate Manager for i authentication spoofing (EUVD-2025-23989)
CVE-2025-5916 | libarchive up to 3.7.x archive_read_support_format_warc.c archive_read_support_format_warc integer overflow (EUVD-2025-17575 / Nessus ID 241063)
CVE-2025-5917 | libarchive up to 3.7.x archive_write_set_format_pax.c build_ustar_entry_name off-by-one (EUVD-2025-17574 / Nessus ID 241063)
CVE-2025-5915 | libarchive up to 3.7.x archive_read_support_format_rar.c copy_from_lzss_window heap-based overflow (EUVD-2025-17576 / Nessus ID 241063)
Weekly Threat Landscape Digest – Week 33
This week’s cybersecurity landscape highlights a dynamic threat environment characterized by newly disclosed vulnerabilities, active exploitation of known flaws, and […]
The post Weekly Threat Landscape Digest – Week 33 appeared first on HawkEye.
Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme
CVE-2022-50063 | Linux Kernel up to 5.19.3 tagging dsa_tree_change_tag_proto null pointer dereference (Nessus ID 250250 / WID-SEC-2025-1350)
CVE-2021-3543 | Linux Kernel Nitro Enclaves Driver null pointer dereference (Nessus ID 250254)
CVE-2024-58073 | Linux Kernel up to 6.13.1 dpu_plane_atomic_print_state null pointer dereference (Nessus ID 250253)
CVE-2025-38460 | Linux Kernel up to 6.16-rc5 atm to_atmarpd null pointer dereference (EUVD-2025-22681 / Nessus ID 250252)
CVE-2022-50139 | Linux Kernel up to 5.10.136/5.15.60/5.18.17/5.19.1 usb ast_vhub_init_desc reference count (Nessus ID 250257)
Analysis Sees Limited End User Ability to Accurately Identify Phishing Attacks
An analysis of telemetry data published by Red Canary, a unit of Zscaler, finds only 16% of the tens of thousands of phishing emails reported by end users in the first half of 2025 proved to be actual threats. At the same time, however, the report also noted that cybercriminals are employing increasingly sophisticated techniques,..
The post Analysis Sees Limited End User Ability to Accurately Identify Phishing Attacks appeared first on Security Boulevard.
VMware security advisory (AV25-521)
Colt Telecommunications Struggles in Wake of Cyber Incident
10 Best Free Data Recovery Software 2025
Free data recovery software or tools are among the most essential tools, playing a crucial role in our lives. Although you can find dozens of them nowadays, their importance remains significant. Losing our data from a device due to failure of the device, an attack by ransomware or accidentally erasing of data can become a […]
The post 10 Best Free Data Recovery Software 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.