Aggregator
CVE-2025-37995 | Linux Kernel up to 5.15.182/6.1.138/6.6.90/6.12.28/6.14.6 kobject_put uninitialized pointer
CVE-2025-37994 | Linux Kernel up to 5.15.182/6.1.138/6.6.90/6.12.28/6.14.6 UCSI Driver ucsi_displayport_work null pointer dereference
CVE-2025-37999 | Linux Kernel up to 6.12.28/6.14.6 fileio erofs_onlinefolio_split allocation of resources
CVE-2025-37993 | Linux Kernel up to 6.12.28/6.14.6 m_can m_can_class_allocate_dev initialization
CVE-2025-4081 | Blackmagic Design DaVinci Resolve up to 19.1.3 on macOS com.apple.security.cs.disable-library-validation default permission
僵尸网络入侵 9,000 多台华硕路由器,添加持续 SSH 后门
C# теперь как Python: Microsoft упростила запуск скриптов
Mitigating Credential Theft Risks in Active Directory Environments
As cyber threats increase in sophistication and frequency, organizations are under increasing pressure to secure their digital infrastructure. Microsoft’s Active Directory (AD) remains the backbone of identity and access management for most enterprises, making it a high-value target for attackers. One of the most effective ways to strengthen AD defenses is through the strategic use […]
The post Mitigating Credential Theft Risks in Active Directory Environments appeared first on Cyber Security News.
新的 PumaBot 僵尸网络利用强制 SSH 凭据入侵设备
New PumaBot Hijacks IoT Devices by Brute Forcing SSH Credentials For Persistence
A sophisticated new malware strain dubbed PumaBot has emerged in the cybersecurity landscape, specifically targeting Internet of Things (IoT) devices through aggressive SSH credential brute-forcing campaigns. This latest threat represents a significant evolution in IoT-focused malware, demonstrating advanced persistence mechanisms and stealth capabilities that allow it to maintain long-term access to compromised devices across diverse […]
The post New PumaBot Hijacks IoT Devices by Brute Forcing SSH Credentials For Persistence appeared first on Cyber Security News.
CVE-2012-1710 | Oracle Fusion Middleware 10.1.3.5 WebCenter Forms Recognition Remote Code Execution (Nessus ID 58798 / SBV-34978)
CVE-2012-4681 | Oracle Java SE/JRE up to 7 Update 6 SunToolkit rt.jar setAccessible privileges management (EDB-20865 / Nessus ID 61740)
CVE-2022-27924 | Synacor Zimbra Collaboration 8.8.15/9.0 Memcache Command injection
CVE-2022-30333 | Rarlab UnRAR up to 6.11 on Unix/Linux Unpack pathname traversal (Nessus ID 232667)
APT41 恶意软件滥用谷歌日历进行隐蔽的 C2 通信
Alleged sale of admin and shell access to an unidentified organization in France
Victoria’s Secret ‘s website offline following a cyberattack
Navigating os.Root and Path Traversal Vulnerabilities | Go 1.24 Detection and Protection Methods | Contrast Security
The latest Go release — Go 1.24, released in February 2025 — introduced a significant security enhancement: the os.Root type.
The post Navigating os.Root and Path Traversal Vulnerabilities | Go 1.24 Detection and Protection Methods | Contrast Security appeared first on Security Boulevard.