Aggregator
CVE-2025-63945 | Tencent iOA App up to 210.9.28693.621001 on Windows race condition
CVE-2025-63946 | Tencent PC Manager App up to 17.10.28554.205 on Windows race condition
CVE-2026-27741 | Bludit up to 3.16.1 cross-site request forgery (Issue 1577)
CVE-2025-61146 | saitoha libsixel 1.8.7 malloc_stub.c memory leak (Nessus ID 299834)
ShinyHunters Leak 2M Records From Dutch Telecom Odido, Claim 21M Stolen
CVE-2026-26096 | Owl opds up to 2.2.0.4 Network Request permission assignment
CVE-2026-26100 | Owl opds up to 2.2.0.4 Network Request permission assignment
CVE-2026-26101 | Owl opds up to 2.2.0.4 Network Request permission assignment
CVE-2026-26102 | Owl opds up to 2.2.0.4 Network Request permission assignment
CVE-2026-26097 | Owl opds up to 2.2.0.4 Network Request uncontrolled search path
CVE-2026-26098 | Owl opds up to 2.2.0.4 Network Request uncontrolled search path
CVE-2026-26099 | Owl opds up to 2.2.0.4 Network Request uncontrolled search path
CVE-2026-2472 | Google Cloud Vertex AI SDK for Python up to 1.130.x _evals_visualization cross site scripting (gcp-2026-011)
CVE-2026-26464 | Kashipara Society Management System 1.0 HTTP Request /admin/edit_user.php Name cross site scripting
CVE-2026-2698 | Tenable Security Center up to 6.7.x authorization (Nessus ID 299698)
Zerobot Malware Targets n8n Automation Platform
Researchers Uncover Aeternum C2 Infrastructure with Advanced Persistence and Network Evasion Features
For years, taking down a botnet meant finding its command-and-control (C2) server, seizing the domain, and watching the network go dark. Law enforcement used this method to dismantle major operations like Emotet, TrickBot, and QakBot. A newly discovered botnet loader called Aeternum C2 has been built specifically to close that door, storing all of its […]
The post Researchers Uncover Aeternum C2 Infrastructure with Advanced Persistence and Network Evasion Features appeared first on Cyber Security News.
Claude Code Security Crashed the Market Because We’re Defending the Wrong Thing
On Feb. 20, the cybersecurity market experienced a structural tremor. Anthropic released Claude Code Security, pointing its Claude Opus 4.6 and million-token context window at the industry’s most “vetted” codebases. This is a significant change from standard pattern-matching against known signatures, achieved by applying semantic reasoning to trace data flows and map component interactions across..
The post Claude Code Security Crashed the Market Because We’re Defending the Wrong Thing appeared first on Security Boulevard.