Aggregator
CVE-2026-21720 | Grafana up to 11.6.8/12.0.7/12.1.4/12.2.2/12.3.0 Gravatar Image /avatar/:hash random values (Nessus ID 297198 / WID-SEC-2026-0224)
Hackers Attacking SonicWall Firewalls from 4,000+ unique IP Addresses to Exploit Vulnerabilities
A large-scale reconnaissance campaign is actively targeting SonicWall firewalls across the internet, with attackers using more than 4,000 unique IP addresses to map vulnerable devices before launching exploitation attempts. Between February 22 and February 25, 2026, threat actors generated 84,142 scanning sessions against SonicWall SonicOS infrastructure, originating from 4,305 distinct IP addresses across 20 autonomous […]
The post Hackers Attacking SonicWall Firewalls from 4,000+ unique IP Addresses to Exploit Vulnerabilities appeared first on Cyber Security News.
定弦定角几何最值之代数化
Anthropic confirms Claude is down in a worldwide outage
CVE-2025-68300 | Linux Kernel up to 6.12.60/6.17.10 lookup_mnt_ns reference count (Nessus ID 299777 / WID-SEC-2025-2868)
CVE-2025-71072 | Linux Kernel up to 6.12.63/6.18.2/6.19-rc1 simple_offset_rename information disclosure (Nessus ID 299777)
CVE-2025-68298 | Linux Kernel up to 6.12.60/6.17.10 btusb_mtk_claim_iso_intf null pointer dereference (Nessus ID 299777 / WID-SEC-2025-2868)
CVE-2025-68822 | Linux Kernel up to 6.12.63/6.18.2/6.19-rc1 alps_reconnect use after free (Nessus ID 299777)
CVE-2025-68810 | Linux Kernel up to 6.12.63/6.18.2/6.19-rc1 KVM use after free (Nessus ID 299777)
CVE-2025-71100 | Linux Kernel up to 6.12.63/6.18.3/6.19-rc3 wifi trx.c rtl92cu_tx_fill_desc tids[] array index (Nessus ID 299777)
CVE-2026-27628 | py-pdf pypdf up to 6.7.1 infinite loop (ID 3654 / EUVD-2026-8601)
Threat Attribution: Why Structure Beats Speculation And How Hawkeye Delivers Both
When a breach occurs, most security teams move fast on containment. Systems get isolated, backups get activated, and logs get […]
The post Threat Attribution: Why Structure Beats Speculation And How Hawkeye Delivers Both appeared first on HawkEye.
Вашу цифровую фоторамку взломали, чтобы вызвать отряд к соседу. И это не шутка
小鼠研究发现器官同步衰老但存在性别差异
Alert: NCSC advises UK organisations to take action following conflict in the Middle East
How to Protect Your SaaS from Bot Attacks with SafeLine WAF
Стать гражданином любой страны за пару минут. Цифровой паспорт оказался фальшивкой, а тюремный срок настоящим
OCRFix Botnet Trojan Leveraging ClickFix Phishing and EtherHiding to Conceal Blockchain-Based Command Infrastructure
A newly identified botnet trojan campaign, dubbed OCRFix, has been discovered combining social engineering tricks with blockchain-based command infrastructure to quietly build a network of compromised machines. The campaign blends the well-known ClickFix phishing technique with EtherHiding — a method that stores attacker instructions directly on a public blockchain, making takedowns nearly impossible. The attack […]
The post OCRFix Botnet Trojan Leveraging ClickFix Phishing and EtherHiding to Conceal Blockchain-Based Command Infrastructure appeared first on Cyber Security News.