Aggregator
CVE-2026-20098 | Cisco Meeting Management up to 3.12.0 Certificate Management unrestricted upload (cisco-sa-cmm-file-up-kY47n8kK)
CVE-2026-23088 | Linux Kernel up to 6.6.121/6.12.67/6.18.7/6.19-rc6 trace_event_raw_event_synth memory corruption
CVE-2026-23064 | Linux Kernel up to 6.6.121/6.12.67/6.18.7/6.19-rc6 sched tcf_ife_encode null pointer dereference
How Threat Intelligence Helps Protect Financial Organizations from Business Risk
The financial sector resembles a treasure vault under constant siege. Banks, insurers, and fintech firms are not just custodians of money. They are guardians of irreplaceable personal and corporate data, payment flows, transactional integrity, and trust itself. When cybercriminals strike, the ripple effects cascade outward, threatening individual savings, corporate balance sheets, national infrastructures, and broader economic confidence. The Biggest […]
The post How Threat Intelligence Helps Protect Financial Organizations from Business Risk appeared first on ANY.RUN's Cybersecurity Blog.
10000 зараженных серверов и госсайты под ударом. Вирус SystemBC незаметно захватывает интернет
Questions Loom Ahead of Substance Abuse Privacy Rules Shift
Harvard, UPenn Data Leaked in ShinyHunters Shakedown
Harvard University has been named as a victim and doxed by hack-and-leak group ShinyHunters, apparently as a result of the cybercrime group's ongoing "live phishing" attacks that often attempt to trick IT help desks into giving attackers direct access to a victim's network and cloud-based data.
Semperis Buys MightyID to Expand Identity Security
Semperis has acquired MightyID to extend its identity-first security and cyber resilience strategy beyond Active Directory and Entra ID into Okta and Ping. CEO Mickey Bresman says the deal addresses customer demand for multi-identity provider protection backup recovery and migration.
How SCSU Is Rebuilding Campus Technology for the AI Era
Like other schools, Southern Connecticut State University is under pressure to modernize legacy systems, strengthen security and adopt AI. CIO Tom Armstrong must balance expanding research ambitions, student expectations and operational efficiency in an increasingly complex risk environment.
TRM Labs Raises $70M Series C for AI Crime-Fighting Push
TRM Labs has secured $70 million in Series C funding led by Blockchain Capital reaching a $1 billion valuation. CEO Esteban Castano says the money will boost AI-powered investigations, compliance automation and intelligence as criminals use AI to scale cybercrime faster than defenders can respond.
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2025-11953 React Native Community CLI OS Command Injection Vulnerability
- CVE-2026-24423 SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Why a decade-old EnCase driver still works as an EDR killer
Attackers are leaning on a new EDR killer malware that can shut down 59 widely used endpoint security products by misusing a kernel driver that once shipped with Guidance Software’s EnCase digital forensics tool, Huntress researchers warn. This particular driver is legitimate but its certificate expired and was revoked more than ten years ago. Even so, Windows still allows it to load. The attack Huntress’ security experts spotted this intrusion earlier this month, and discovered … More →
The post Why a decade-old EnCase driver still works as an EDR killer appeared first on Help Net Security.
International sting dismantles illegal streaming empire serving millions
Actions by authorities from Italy, Romania, Spain, the United Kingdom, Canada, Kosovo and South Korea, supported by Eurojust and Europol, led to the seizure of multiple illegal streaming services. A total of 31 suspected members have been linked to the operation. The group engaged in unauthorised distribution of pay TV content, illegal access to information technology systems, computer fraud and money laundering. The activity expanded as revenue increased, enabling the distribution of illegal streaming services … More →
The post International sting dismantles illegal streaming empire serving millions appeared first on Help Net Security.