Aggregator
CVE-2025-68822 | Linux Kernel up to 6.12.63/6.18.2/6.19-rc1 alps_reconnect use after free (Nessus ID 299777)
CVE-2025-68810 | Linux Kernel up to 6.12.63/6.18.2/6.19-rc1 KVM use after free (Nessus ID 299777)
CVE-2025-71100 | Linux Kernel up to 6.12.63/6.18.3/6.19-rc3 wifi trx.c rtl92cu_tx_fill_desc tids[] array index (Nessus ID 299777)
CVE-2026-27628 | py-pdf pypdf up to 6.7.1 infinite loop (ID 3654 / EUVD-2026-8601)
Threat Attribution: Why Structure Beats Speculation And How Hawkeye Delivers Both
When a breach occurs, most security teams move fast on containment. Systems get isolated, backups get activated, and logs get […]
The post Threat Attribution: Why Structure Beats Speculation And How Hawkeye Delivers Both appeared first on HawkEye.
Вашу цифровую фоторамку взломали, чтобы вызвать отряд к соседу. И это не шутка
小鼠研究发现器官同步衰老但存在性别差异
Alert: NCSC advises UK organisations to take action following conflict in the Middle East
How to Protect Your SaaS from Bot Attacks with SafeLine WAF
Стать гражданином любой страны за пару минут. Цифровой паспорт оказался фальшивкой, а тюремный срок настоящим
OCRFix Botnet Trojan Leveraging ClickFix Phishing and EtherHiding to Conceal Blockchain-Based Command Infrastructure
A newly identified botnet trojan campaign, dubbed OCRFix, has been discovered combining social engineering tricks with blockchain-based command infrastructure to quietly build a network of compromised machines. The campaign blends the well-known ClickFix phishing technique with EtherHiding — a method that stores attacker instructions directly on a public blockchain, making takedowns nearly impossible. The attack […]
The post OCRFix Botnet Trojan Leveraging ClickFix Phishing and EtherHiding to Conceal Blockchain-Based Command Infrastructure appeared first on Cyber Security News.