Aggregator
CVE-2025-49196 | SICK Field Analytics TLS risky encryption (EUVD-2025-18181)
CVE-2022-49321 | Linux Kernel up to 5.18.3 xprtrdma bc_serv null pointer dereference (Nessus ID 238226)
CVE-2022-49601 | Linux Kernel up to 5.18.14 READ_ONCE information disclosure (Nessus ID 238226)
CVE-2022-49671 | Linux Kernel up to 5.10.128/5.15.52/5.18.9 cm_alloc_id_priv memory leak (Nessus ID 238226)
CVE-2022-49632 | Linux Kernel up to 5.15.55/5.18.12 READ_ONCE information disclosure (Nessus ID 238226)
CVE-2022-49664 | Linux Kernel up to 5.10.128/5.15.52/5.18.9 tipc_bcast_rcv null pointer dereference (Nessus ID 238226)
CVE-2022-49602 | Linux Kernel up to 5.18.14 sysctl_fwmark_reflect information disclosure (Nessus ID 238226)
CVE-2022-49639 | Linux Kernel up to 5.18.12 READ_ONCE information disclosure (Nessus ID 238226)
CVE-2022-49065 | Linux Kernel up to 5.10.111/5.15.34/5.17.3 svc_revisit null pointer dereference (Nessus ID 238226)
CVE-2022-49604 | Linux Kernel up to 4.19.253/5.4.207/5.10.133/5.15.57/5.18.14 sysctl_ip_fwd_use_pmtu information disclosure (Nessus ID 238226)
CVE-2022-49637 | Linux Kernel up to 5.4.206/5.10.131/5.15.55/5.18.12 READ_ONCE information disclosure (Nessus ID 238226)
CVE-2022-49210 | Linux Kernel up to 5.10.109/5.15.32/5.16.18/5.17.1 pgd_free memory leak (Nessus ID 238226)
迪士尼和 NBC 起诉 Midjourney 侵犯版权
Ensuring Endpoint Security Compliance in Windows Environments: Best Practices for Protection
Modern endpoint security compliance in Windows relies on hybrid management, continuous monitoring, automated patching, and policy enforcement. Migrating from GPOs to CSPs improves scalability and supports remote devices. Integrating with IAM enforces least privilege. Automation, real-time analytics, and role-based controls help reduce risk, ensure compliance, and support evolving management needs. Endpoint security compliance isn’t just … Continued
安全行动: 国际刑警组织在打击网络犯罪的重大行动中摧毁了 20,000 多个恶意 IP
OpenPGP.js Vulnerability Let Attackers Spoof Message Signature Verification
A critical vulnerability in the widely-used OpenPGP.js library has been discovered that allows attackers to forge digital signatures and deceive users into believing malicious content was legitimately signed by trusted sources. The flaw, designated CVE-2025-47934, represents a fundamental breach of cryptographic trust that could undermine secure communications across numerous web-based applications and email clients that […]
The post OpenPGP.js Vulnerability Let Attackers Spoof Message Signature Verification appeared first on Cyber Security News.
Password-spraying attacks target 80,000 Microsoft Entra ID accounts
137,000 SoftBank Customers Affected by Data Leak from Third-Party Vendor
SoftBank has previously experienced significant data breaches. In 2004, the company confirmed that personal information on 4,517,039 customers had been leaked through two separate cases involving suspects Yuasa and Kimata. This historical incident demonstrates the scale of data security challenges telecommunications companies face. Current Data Protection Framework SoftBank has established comprehensive data protection policies following […]
The post 137,000 SoftBank Customers Affected by Data Leak from Third-Party Vendor appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions
A critical command injection vulnerability in Palo Alto Networks PAN-OS operating system enables authenticated administrative users to escalate privileges and execute commands as the root user. Designated as CVE-2025-4231, this medium-severity vulnerability affects multiple versions of the company’s firewall operating system and poses significant security risks when management interfaces are exposed to untrusted networks. The […]
The post Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions appeared first on Cyber Security News.