Aggregator
CVE-2025-49670 | Microsoft Windows Server 2008 R2 SP1 up to Server 2022 23H2 Routing/Remote Access Service heap-based overflow
CVE-2025-49669 | Microsoft Windows Server 2008 R2 SP1 up to Server 2022 23H2 Routing/Remote Access Service heap-based overflow
Windows 11 KB5062553 & KB5062552 cumulative updates released
Microsoft July 2025 Patch Tuesday fixes one zero-day, 137 flaws
Zoom Clients for Windows Vulnerability Exposes Users to DoS Attacks
Recently, two vulnerabilities have been discovered in specific Zoom Clients for Windows, which could enable attackers to launch Denial of Service (DoS) attacks. These flaws, tracked under CVE-2025-49464 and CVE-2025-46789, were reported by security researcher fre3dm4n and carry a Medium severity rating with a CVSS score of 6.5 each. Nature of the Vulnerabilities Both vulnerabilities […]
The post Zoom Clients for Windows Vulnerability Exposes Users to DoS Attacks appeared first on Cyber Security News.
Искали «пополнить МСД» — пополнили счёт мошенника: 39 сайтов в топе поиска
CVE-2025-48802 | Microsoft Windows 11 22H2/11 23H2/Server 2022/Server 2022 23H2 SMB Server certificate validation
Microsoft Patch Tuesday July 2025: 130 Vulnerabilities Fixed Including 41 RCE
Microsoft released patch Tuesday June 2025 as a monthly security update, addressing a total of 130 Microsoft Common Vulnerabilities and Exposures (CVEs) and republishing 10 non-Microsoft CVEs. Vulnerability Type Count Remote Code Execution (RCE) 41 Elevation of Privilege (EoP) 53 Information Disclosure (ID) 18 Denial of Service (DoS) 5 Spoofing 4 Data Tampering 1 Security […]
The post Microsoft Patch Tuesday July 2025: 130 Vulnerabilities Fixed Including 41 RCE appeared first on Cyber Security News.
MediaTek July 2025 Security Update Patches Vulnerabilities Affecting a Wide Range of Their Chipsets
MediaTek has released a comprehensive security bulletin addressing 16 critical vulnerabilities across its extensive chipset portfolio, affecting devices from smartphones to IoT platforms. The update, evaluated using the Common Vulnerability Scoring System version 3.1 (CVSS v3.1), includes seven high-severity and nine medium-severity vulnerabilities that impact Bluetooth, WLAN, and various system components. Device OEMs received notifications […]
The post MediaTek July 2025 Security Update Patches Vulnerabilities Affecting a Wide Range of Their Chipsets appeared first on Cyber Security News.
Italian police arrested a Chinese national suspected of cyberespionage on a U.S. warrant
Cybersecurity Operations and AI Carry Hidden Climate Costs
As security monitoring, crypto mining protection and data centers fuel cybersecurity's energy demands, new regulations, such as Australia's National Greenhouse and Energy Reporting Act 2007, signal a global shift toward holding the industry accountable for its environmental impact.
Enterprises Are Prioritizing Generative AI Spending in 2025
Generative AI is now a top budget priority over security for many enterprises, but AI talent gap continues to hinder progress on AI projects. A recent AWS report recommends redefining AI leadership roles and strengthening third-party partnerships to unlock gen AI's full potential.
1 кубик — на краю. 100 — над бездной. Эта башня не упадёт даже если повиснет над Гранд-Каньоном
APT36推出Linux间谍工具:瞄准印度政府系统,首用Go语言构建渗透链
Ivanti security advisory (AV25-405)
Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords
Ivanti has identified and resolved three high-severity vulnerabilities in its Endpoint Manager (EPM) software. If exploited, these flaws could enable attackers to decrypt other users’ passwords or gain access to sensitive database information, posing significant risks to organizations that rely on this endpoint management solution. Ivanti Endpoint Manager Mobile Vulnerabilities Ivanti’s recent security update targets […]
The post Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords appeared first on Cyber Security News.
Ring 0 без охраны. Цена входа — $260. А потом ядро Windows становится твоим
BladedFeline 远程潜伏攻击 IIS 与 Exchange 服务器,渗透中东政府网络
Tycoon2FA, EvilProxy, Sneaky2FA: How To Defend Against These Phishing Kit Attacks
Phishing kits are evolving fast. Threat actors behind toolkits like Tycoon2FA, EvilProxy, and Sneaky2FA are getting smarter, setting up infrastructure that bypasses 2FA and mimics trusted platforms like Microsoft 365 and Cloudflare to steal user credentials without raising red flags. But if you’re part of a SOC or threat intel team, you don’t have to […]
The post Tycoon2FA, EvilProxy, Sneaky2FA: How To Defend Against These Phishing Kit Attacks appeared first on Cyber Security News.