Aggregator
NASA: “Луна подождет”. Астронавты Artemis III готовились топтать лунную пыль… но пока покружат вокруг Земли
On Moltbook
Sviluppo software, intelligenza artificiale e sicurezza
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2026-21385 Qualcomm Multiple Chipsets Memory Corruption Vulnerability
- CVE-2026-22719 Broadcom VMware Aria Operations Command Injection Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
影子图书馆安娜的档案LI域名直接被删除 不过又新增VG/PK/GD域名
[Tool Release] DLLHijackHunter - Automated DLL hijacking detection with canary confirmation
Phishing campaign exploits OAuth redirection to bypass defenses
Amazon: Drone strikes damaged AWS data centers in Middle East
Вход только по СМС. Чиновники потратили на защиту паролей рекордные 47 миллиардов рублей
As War Continues, Pro-Iranian Actors Launch Barrage of Cyberattacks
AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged
AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged
[已和解] 美团光年之外团队就Tabbit浏览器违反开源协议发布回应 结果是自爆
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
Singapore AI Risk Guidelines and Capital Resilience | Kovrr
Singapore AI Risk Guidelines and Capital Resilience | Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience.
The post Singapore AI Risk Guidelines and Capital Resilience | Kovrr appeared first on Security Boulevard.