Aggregator
CVE-2025-8184 | D-Link DIR-513 up to 1.10 HTTP POST Request formSetWanL2TPtriggers formSetWanL2TPcallback stack-based overflow (EUVD-2025-22789)
CVE-2025-8204 | Comodo Dragon up to 134.0.6998.179 HSTS security check (EUVD-2025-22799)
CVE-2025-8206 | Comodo Dragon up to 134.0.6998.179 IP DNS Leakage Detector cross site scripting (EUVD-2025-22800)
CVE-2025-8169 | D-Link DIR-513 1.10 HTTP POST Request formSetWanPPTPpath formSetWanPPTPcallback curTime buffer overflow (EUVD-2025-22755)
CVE-2025-24801 | GLPI up to 10.0.17 PHP File unrestricted upload (GHSA-g2p3-33ff-r555 / Nessus ID 237566)
CVE-2024-6866 | corydolphin flask-cors up to 4.01 Request Path try_match case sensitivity (EUVD-2025-6979 / Nessus ID 237621)
CVE-2024-6844 | corydolphin flask-cors up to 4.0.2/5.0.1 flask_cors/extension.py unquote_plus logic error (EUVD-2025-6972 / Nessus ID 237621)
CVE-2025-0147 | Zoom Workplace App/Meeting SDK/Video SDK up to 6.2.9 on Linux type confusion (Nessus ID 214317)
CVE-2025-0146 | Zom Workplace App up to 6.2.9 on macOS symlink (Nessus ID 214336)
研究人员披露大华摄像头中的ONVIF组件漏洞 无需身份验证即可远程接管设备
朝鲜黑客借招聘诱饵、云账户权限及恶意软件窃取数百万加密货币
朝鲜黑客借招聘诱饵、云账户权限及恶意软件窃取数百万加密货币
Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity
Palo Alto Networks’ Unit 42 threat research team has introduced a groundbreaking systematic approach to threat actor attribution, addressing longstanding challenges in cybersecurity intelligence analysis. The Unit 42 Attribution Framework, unveiled on July 31, 2025, transforms what has traditionally been considered “more art than science” into a structured methodology for analyzing and categorizing cyber threats. […]
The post Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity appeared first on Cyber Security News.
45.55.142.122 – 解锁 Nintendo Switch2 中隐藏的浏览器
八一建军节:致敬最可爱的人
Former Indian MP’s Terror Trial Was Largely Conducted in Her Absence
Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations
A sophisticated cyber campaign leveraging legitimate Remote Monitoring and Management (RMM) tools has emerged as a significant threat to European organizations, particularly those in France and Luxembourg. Since November 2024, threat actors have been deploying carefully crafted PDF documents containing embedded links to RMM installers, effectively bypassing traditional email security measures and malware detection systems. […]
The post Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations appeared first on Cyber Security News.