Aggregator
CVE-2025-38475 | Linux Kernel up to 6.12.39/6.15.7 smc cipso_v4_sock_setattr null pointer dereference
CVE-2025-38469 | Linux Kernel up to 6.6.99/6.12.39/6.15.7 KVM kmalloc_array privilege escalation
Микросхемы умирают, их место займёт свет: физики подбираются к пределам закона Мура
CVE-2025-38468 | Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7 htb_enqueue null pointer dereference
CVE-2025-38476 | Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7 rpl_do_srh_inline use after free
CVE-2025-38487 | Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7 soc unbind misc_deregister null pointer dereference
Android Malware-as-a-Service Gets Cheaper, Packing 2FA Interception
Malware-as-a-service (MaaS) platforms like PhantomOS and Nebula are democratizing Android device attacks because they provide pre-built, subscription-based malware kits for as little as $300 per month, marking a fundamental shift in the cybercrime scene. These services eliminate the need for coding expertise, providing cybercriminals with fully functional Android trojans equipped with advanced capabilities like two-factor […]
The post Android Malware-as-a-Service Gets Cheaper, Packing 2FA Interception appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results
The Oyster malware, also known as Broomstick or CleanupLoader, has resurfaced in attacks disguised as popular tools like PuTTY, KeyPass, and WinSCP. This malware, active since at least 2023, tricks users into downloading malicious installers, potentially paving the way for ransomware infections such as Rhysida. CyberProof Threat Researchers recently uncovered a real-world instance in the […]
The post Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results appeared first on Cyber Security News.
Security considerations for critical infrastructure (ITSAP.10.100)
Tenable Is Named a Gartner Peer Insights Customers’ Choice for the Vulnerability Assessment Market
Tenable customers have spoken: Here’s what they’re saying about our products.
We’re proud to share that Tenable has been named a 2025 Gartner® Peer Insights™ Customers’ Choice1 for Vulnerability Assessment. The best part? It’s based entirely on feedback from the people who use our products every day.
In the 18 months leading up to April 2025, we received 181 verified customer reviews and earned an average rating of 4.7 out of 5 stars. We’re grateful to our customers. That kind of feedback means a lot — and it tells us we're delivering on what matters most.
We’ve said it before and we’ll say it again: vulnerability management is the foundation of exposure management. Full stop. It's the core of what security teams need to understand and reduce risk. When you know which systems are exposed, how critical they are and how likely they are to be exploited you can take smart, focused action — not just react to alerts.
Access the 2025 Gartner® Peer Insights™ Customers’ Choice1 for Vulnerability Assessment
We believe this recognition is a strong signal that our approach is working. Customers count on Tenable’s platform for wide-ranging visibility, risk-based prioritization, clear reporting and remediation, scalability, flexibility and continuous monitoring. Those trusted, proven capabilities are what make our exposure management platform a real difference-maker.
According to Gartner, vulnerability assessment solutions identify, categorize and prioritize vulnerabilities as well as orchestrate their remediation or mitigation. Their primary focus is vulnerability and security configuration assessments for enterprise risk identification and reduction, and reporting against various compliance standards.. The “Voice of the Customer” is a document that applies a methodology to aggregated Gartner Peer Insights’ reviews in a market to provide an overall perspective for IT decision makers.
So yes — this is a big deal. We feel it validates our strategy and reflects the trust our customers place in us every day. And we’re just getting started.
Check out some of the Gartner Peer Insights reviews for yourself:
What Tenable Vulnerability Management customers are talking aboutBelow are excerpts from users of Tenable Vulnerability Management:
"Evolution from Basic to Advanced: The Tale of Tenable""We switched from a competitor's product and the difference is like Win ME to Win11. Tenable is much more advanced and provides so much more value, we don't even know how they compete in the same category." — Senior IT Manager in Transportation
"Addressing Security Risk: Comprehensive Vulnerability Management""Tenable's User-friendly Platform Offers Deep Vulnerability Insights""I've had an exceptional experience with Tenable. The platform is reliable, user-friendly, and provides deep visibility into our vulnerabilities. It's been a valuable tool in strengthening our security posture." — Senior Security Engineer in Retail
"Tenable: Exceptional Service and Consolidated Platform for Enhanced Security"“The product is very versatile and provides a full network visualization of vulnerabilities across several different platforms. Their Tenable One product is growing to be the next IT super tool, enabling the single pane of glass for security that analysts have longed for.” — Director, Governance, Risk & Compliance (industry sector not specified)
What Tenable Security Center customers are talking aboutBelow are excerpts from users of Tenable Security Center:
"Flexibility is Key"“I enjoy being able to use the data to assist various groups within our organization. The data is consistent and accurate as well as very informative. I like the reporting flexibility along with dashboard as they can be tailored to please anyone.” — Director of Vulnerability Management in Banking
"Tenable Platform: A Robust Solution for Efficient Cybersecurity""Tenable SC - still the leader for on prem vulnerability assessment and prioritization ""Tenable continues to provide a leading vulnerability assessment and prioritization platform. The tooling uses Tenable Vulnerability Priority rating to reduce the number of "CVSS high & Criticals" saving time and scope to focus on what are the most dangerous vulnerabilities." — Director, IT & Security Risk Management in Software
What makes Tenable products stand outKey attributes of Tenable products include:
- Broad coverage across cloud, on-prem and hybrid environments
- Risk-based prioritization using real-world threat intelligence (like VPR)
- Actionable remediation guidance with clear, detailed reports
- Scalability and flexibility for any size organization
- Continuous updates backed by Tenable Research and Data Science
- Easy-to-use interfaces and efficient, automated scanning
- Strong integrations with cloud platforms and security tools
- Proven accuracy with low false positives
We appreciate all our customers for taking the time to share your feedback. Your reviews and input help the team at Tenable better understand your unique vulnerability assessment needs so we can identify what’s working for you — and, just as importantly, what’s not. We have utmost respect for the trust you place in us, and we learn from you every day. For us, vulnerability management is not just a product category. It’s a fundamental part of our mission to help organizations around the world secure their most valuable assets and take a proactive approach to managing their exposures.
Learn more- Access the 2025 Gartner® Peer Insights™ Customers’ Choice1 for Vulnerability Assessment
- To learn more about this distinction, or to read the reviews written about our products by the cybersecurity professionals who use them, please see the vulnerability assessment page on Gartner Peer Insights.
- If you have a Tenable story to share, please join the crowd at Gartner Peer Insights. Contribute a review today: https://gtnr.io/RY78mMFGR
1Gartner, Voice of the Customer for Vulnerability Assessment, By Peer Contributors, 11 July 2025
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, PEER INSIGHTS is a registered trademark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved.
The Gartner Peer Insights Customers’ Choice Badge, Gartner®, and Peer Insights™ are trademarks of Gartner, Inc. and/or its affiliates. All rights reserved. Gartner® Peer InsightsTM content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.
Ubuntu 25.04 для Snapdragon X: загрузка пошла, а дальше — цикличный ад
Atomic macOS Stealer Upgraded with Remote Access Backdoor
The Atomic macOS Stealer (AMOS), a notorious infostealer malware targeting Apple’s macOS ecosystem, has undergone a significant upgrade by incorporating a sophisticated backdoor mechanism that facilitates persistent access and remote command execution on infected systems. This enhancement, detailed in a recent report by Moonlock Lab, a cybersecurity arm of MacPaw, transforms AMOS from a mere […]
The post Atomic macOS Stealer Upgraded with Remote Access Backdoor appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More
World Wide CTF 2025
Date: July 26, 2025, noon — 28 July 2025, 12:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://wwctf.com/
Rating weight: 24.48
Event organizers: World Wide Flags
CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2025-20281 Cisco Identity Services Engine Injection Vulnerability
- CVE-2025-20337 Cisco Identity Services Engine Injection Vulnerability
- CVE-2023-2533 PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Naval Group Denies Hack Claims, Alleges "Reputational Attack"
Social engineering attack obtains data on ‘majority’ of Allianz Life customers
Inside Muddled Libra’s Playbook: Call Center Attacks for Initial Breach
Palo Alto Networks’ Unit 42, the cybercrime group tracked as Muddled Libra also known as Scattered Spider or UNC3944 has demonstrated remarkable resilience and adaptation in 2025, following international law enforcement disruptions in late 2024. Despite federal charges against five suspected members in November 2024, the group has escalated its intrusion operations across sectors including […]
The post Inside Muddled Libra’s Playbook: Call Center Attacks for Initial Breach appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.