Aggregator
CVE-2025-31648 | Intel Processor values (intel-sa-01396 / Nessus ID 300189)
CVE-2026-0752 | GitLab Community Edition/Enterprise Edition up to 18.7.4/18.8.4/18.9.0 Mermaid Sandbox UI cross site scripting (Issue 585371 / Nessus ID 300183)
CVE-2026-25952 | FreeRDP up to 3.22.x xf_SetWindowMinMaxInfo use after free (GHSA-cgqm-cwjg-7w9x / Nessus ID 300191)
Кажется, мы неправильно считали возраст Вселенной. Телескоп за 10 миллиардов долларов нашел лишнее
VMware security advisory (AV26-186)
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel
When Trusted Authentication Enables Privilege Escalation
Active Directory remains the backbone of enterprise identity. Despite years of modernization efforts, many organizations still rely on legacy authentication protocols that were never designed for today’s threat landscape. New reporting from Dark Reading highlights how attackers continue to abuse NTLM and Kerberos within Microsoft Active Directory environments to escalate privileges, move laterally, and maintain
The post When Trusted Authentication Enables Privilege Escalation appeared first on Seceon Inc.
The post When Trusted Authentication Enables Privilege Escalation appeared first on Security Boulevard.
万家团圆,网安同庆,诸事“圆”满 🌕
HPE security advisory (AV26-185)
Chrome Gemini Vulnerability Lets Attackers Access Victims’ Camera and Microphone Remotely
A high-severity security vulnerability has been discovered in Google Chrome’s integrated Gemini AI assistant, exposing users to unauthorized camera and microphone access, local file theft, and phishing attacks, all without requiring any user interaction beyond launching the browser’s built-in AI panel. Tracked as CVE-2026-0628, the flaw was uncovered by researchers at Palo Alto Networks’ Unit […]
The post Chrome Gemini Vulnerability Lets Attackers Access Victims’ Camera and Microphone Remotely appeared first on Cyber Security News.
CVE-2026-23600 | HPE AutoPass License Server up to 9.18 improper authentication (EUVD-2026-9179)
North Korean Hackers Target Developers Through npm Packages
Open-source ecosystems power modern software development. Millions of developers rely on public repositories to accelerate innovation and reduce development time. That trust, however, is increasingly being weaponized. New reporting from The Hacker News reveals that North Korean threat actors have published 26 malicious packages to the npm registry in an attempt to compromise developer environments
The post North Korean Hackers Target Developers Through npm Packages appeared first on Seceon Inc.
The post North Korean Hackers Target Developers Through npm Packages appeared first on Security Boulevard.