Aggregator
CVE-2022-24990 | TerraMaster NAS up to 4.2.29 webNasIPS PWD information disclosure
CVE-2025-11687 | GNOME GI-DocGen Search Term cross site scripting (Nessus ID 270835)
[Control systems] ABB security advisory (AV25-687)
Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework
The emergence of the AdaptixC2 post-exploitation framework in 2025 marked a significant milestone in the evolution of attacker toolsets targeting open-source supply chains. Positioning itself as a formidable alternative to established tools like Cobalt Strike, AdaptixC2 quickly attracted threat actors seeking agility and stealth in post-exploitation scenarios. This October, researchers uncovered its delivery through the […]
The post Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework appeared first on Cyber Security News.
2 миллиарда FPS в гараже: Ютубер AlphaPhoenix собрал камеру, которая видит, как "ползет" свет.
CVE-2025-31342 | Galaxy Software Services Vitals ESP up to 1.3 unrestricted upload (EUVD-2025-35042 / CNNVD-202510-2634)
CVE-2025-11948 | Excellent Infotek Document Management System unrestricted upload (EUVD-2025-35025 / CNNVD-202510-2636)
CVE-2025-62577 | Fsas ETERNUS SF AdvancedCopy Manager Standard Edition up to 16.9.1 default permission (EUVD-2025-35035 / CNNVD-202510-2637)
Inside the Synthient Threat Data
Where is your data on the internet? I mean, outside the places you've consciously provided it, where has it now flowed to and is being used and abused in ways you've never expected? The truth is that once the bad guys have your data, it often
CISA confirms hackers exploited Oracle E-Business Suite SSRF flaw
Сможет ли лягушка сбежать? Квантовое исследование обнаружило скрытые выходы для захваченных электронов
Salt Typhoon APT Targets Global Telecom and Energy Sectors, Says Darktrace
Defakto Raises $30.75M to Lead Non-Human Identity Space
With $30.75 million in Series B funding, Defakto aims to strengthen non-human identity security across AI workloads and cloud platforms. The Silicon Valley-based startup plans to deepen discovery, governance and enterprise integrations, while expanding its go-to-market strategy.
Russian Disinformation Followed Drone Incursion of Poland
After Russian drones violated Polish airspace last month, multiple pro-Kremlin information operations teams sprang into action to advance pro-Moscow narratives that distorted the facts, as part of a hybrid operation designed to destabilize Poland, and NATO support for Ukraine, said experts.