Aggregator
CVE-2022-50937 | Ametys CMS 4.4.1 External Link cross site scripting (Exploit 50692 / EDB-50692)
CVE-2026-21869 | ggml-org llama.cpp up to 55d4206c8 Completion Endpoint n_discard out-of-bounds write (GHSA-8947-pfff-2f3c / Nessus ID 284799)
CVE-2025-62224 | Microsoft Edge up to 143.0.3650.88 on Android clickjacking (WID-SEC-2026-0052)
CVE-2025-12776 | Commvault WebConsole up to 11.32.0/11.36.0/11.40.0/11.42.0 Report Builder cross site scripting (EUVD-2025-206259)
MoltBot Skills exploited to distribute 400+ malware packages in days
YiFangCMS v2.0.5 文件上传RCE代码审计(CVE-2025-9400)
Former Massachusetts Police Officer Sentenced to Four Years for Child Sexual Abuse Material Possession
Russian hackers exploit recently patched Microsoft Office bug in attacks
China-based espionage group compromised Notepad++ for six months
The Chinese APT group Lotus Blossom intruded the tool’s internal systems to snoop on a limited set of users’ activities, according to researchers.
The post China-based espionage group compromised Notepad++ for six months appeared first on CyberScoop.
Позвоночник как у человека, грация — как после вечеринки. Робот XPeng эпично упал на подиуме
Panera Bread breach affected 5.1 Million accounts, HIBP Confirms
Fast-Growing Chinese Crime Networks Launder 20% of Illicit Crypto: Chainalysis
The influence of Chinese money laundering networks has skyrocketed since 2020, with the operations now moving almost 20% of all illicit cryptocurrency being laundered last year, according to Chainalysis researchers. In 2025, they processed more than $16 billion, or about $44 million a day.
The post Fast-Growing Chinese Crime Networks Launder 20% of Illicit Crypto: Chainalysis appeared first on Security Boulevard.
What Verified Breach Data Changes About Exposure Monitoring
Exposure monitoring has become a core function for security and risk teams but many programs still struggle to deliver clear, actionable outcomes. Alerts pile up, dashboards expand, and yet teams are often left with the same unanswered question: Which exposures actually matter right now? The difference between noise and signal in exposure monitoring often comes …
The post What Verified Breach Data Changes About Exposure Monitoring appeared first on Security Boulevard.
NDSS 2025 – VeriBin: Adaptive Verification Of Patches At The Binary Level
Session 11B: Binary Analysis
Authors, Creators & Presenters: Hongwei Wu (Purdue University), Jianliang Wu (Simon Fraser University), Ruoyu Wu (Purdue University), Ayushi Sharma (Purdue University), Aravind Machiry (Purdue University), Antonio Bianchi (Purdue University)
PAPER
VeriBin: Adaptive Verification of Patches at the Binary Level
Vendors are often provided with updated versions of a piece of software, fixing known security issues. However, the inability to have any guarantee that the provided patched software does not break the functionality of its original version often hinders patch deployment. This issue is particularly severe when the patched software is only provided in its compiled binary form. In this case, manual analysis of the patch's source code is impossible, and existing automated patch analysis techniques, which rely on source code, are not applicable. Even when the source code is accessible, the necessity of binary-level patch verification is still crucial, as highlighted by the recent XZ Utils backdoor. To tackle this issue, we propose VeriBin, a system able to compare a binary with its patched version and determine whether the patch is ''Safe to Apply'', meaning it does not introduce any modification that could potentially break the functionality of the original binary. To achieve this goal, VeriBin checks functional equivalence between the original and patched binaries. In particular, VeriBin first uses symbolic execution to systematically identify patch-introduced modifications. Then, it checks if the detected patch-introduced modifications respect specific properties that guarantee they will not break the original binary's functionality. To work without source code, VeriBin's design solves several challenges related to the absence of semantic information (removed during the compilation process) about the analyzed code and the complexity of symbolically executing large functions precisely. Our evaluation of VeriBin on a dataset of 86 samples shows that it achieves an accuracy of 93.0% with no false positives, requiring only minimal analyst input. Additionally, we showcase how VeriBin can be used to detect the recently discovered XZ Utils backdoor.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 – VeriBin: Adaptive Verification Of Patches At The Binary Level appeared first on Security Boulevard.
Chinese Hackers Hijack Notepad++ Updates for 6 Months
Reorient Your Thinking to Tackle AI Security Risks
The rise of artificial intelligence has rendered portions of your current cybersecurity playbook obsolete. Unless Chief Information Security Officers (CISOs) act quickly to reorient their thinking, they may be unaware of and unprepared to face emerging AI-related threats. Learn how to secure your organization’s AI usage and ensure implementation won’t have negative consequences. The Serious..
The post Reorient Your Thinking to Tackle AI Security Risks appeared first on Security Boulevard.