Aggregator
CVE-2020-8927 | Brotli up to 1.0.7 Decompression length parameter (Nessus ID 236717)
CVE-2021-27219 | GNOME GLib up to 2.66.5/2.67.2 on 64-bit g_bytes_new memory corruption (Nessus ID 236721)
CVE-2020-8927 | Microsoft Visual Studio 2019 16.11/2022 17.0 Brotli buffer overflow (USN-4568-1 / Nessus ID 236717)
CVE-2023-49286 | Squid Proxy up to 6.4 Helper Process Management incorrect check of function return value (GHSA-xggx-9329-3c27 / Nessus ID 236724)
特朗普要求苹果停止在印度扩大制造业务
Why Context is King in Cyber Risk Quantification: Key Webinar Takeaways
In cybersecurity, the most complex problems often do not have neat solutions. But in a recent conversation with veteran CISO Ed Amoroso and Balbix CEO and Founder Gaurav Banga, one thing was clear: we’re past the point where “we tried our best” is enough. Accountability, quantification, and context are now table stakes for any organization …
The post Why Context is King in Cyber Risk Quantification: Key Webinar Takeaways appeared first on Security Boulevard.
SecWiki News 2025-05-16 Review
突破综述:SAP NetWeaver Flaw吸引黑客
GitLab 18首次亮相,为DevSecOps团队提供AI原生功能
ChatGPT rolls out Codex, an AI tool for software programming
Coinbase在内幕数据泄露后悬赏2000万美元
Pro-Ukraine Group Targets Russian Developers with Python Backdoor
盘古全球研究暴露的新兴人工智能安全风险
立即补丁:SonicWall SMA 1000缺陷(CVE-2025-40595)启用Stealth SSRF攻击
关键NAS风险:9.8 CVD的IO数据缺陷允许远程命令执行
模型上下文协议(MCP)的原理与安全挑战
Jenkins插件缺陷暴露了严重风险:CVE-2025-47889通过Auth Bypass达到9.8 CVD
TransferPlayer恶意软件被揭露:启用IPFS的加载器部署具有混淆精度的勒索软件和后门
SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack
A coordinated phishing campaign targeting Kuwait’s critical sectors has been exposed through a distinctive operational security lapse: the consistent reuse of SSH authentication keys across multiple attack servers. The campaign, which remains active as of May 2025, has deployed over 100 domains to harvest credentials through meticulously cloned login portals impersonating legitimate Kuwaiti businesses in […]
The post SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack appeared first on Cyber Security News.