Aggregator
IBM security advisory (AV25-679)
AWS Outage Impacts Amazon, Snapchat, Prime Video, Canva and More – Update
A widespread Amazon Web Services (AWS) outage on Monday disrupted operations for millions of users worldwide, knocking out access to everything from streaming giants to social media platforms and financial apps. The incident, which began early in the morning, affected high-profile services like Amazon’s own e-commerce site, Snapchat, Prime Video, Canva, and countless others reliant […]
The post AWS Outage Impacts Amazon, Snapchat, Prime Video, Canva and More – Update appeared first on Cyber Security News.
CVE-2025-8349 | Tawk Live Chat PDF cross site scripting
CVE-2025-41028 | Grupo Castilla Epsilon RH 3.03.36.010 POST Request WSAvisos.asmx sEstadoUsr sql injection (EUVD-2025-35043)
2 клика, чтобы ИИ рассказал рецепт коктейля Молотова. Snapchat считает, что это нормально
Behind the struggle for control of the CVE program
Following a funding scare that nearly shuttered the CVE program, outside experts and CISA are positioning to take charge of the 25-year-old system before the next funding crisis hits.
The post Behind the struggle for control of the CVE program appeared first on CyberScoop.
Servo v0.0.1 释出
От HTTP-потока к ИИ-ботам: как простые скрипты превратились в «кукловодов». Эволюция DDoS в России за один квартал
Evilginx’s creator reckons with the dark side of red-team tools
⚡ Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More
A “No-Brainer” Investment: Proactive Google Safety and Security with Cloud Monitor
Bureau Valley CUSD Protects Students and Data While Maximizing Budget and Efficiency Bureau Valley Community Unit School District (CUSD) in Manlius, Illinois, serves approximately 900 students and 180 faculty and staff. It operates on a 1:1 Chromebook model using Google Workspace for Education Fundamentals. “If it plugs in or has a battery, it’s our responsibility,” ...
The post A “No-Brainer” Investment: Proactive Google Safety and Security with Cloud Monitor appeared first on ManagedMethods Cybersecurity, Safety & Compliance for K-12.
The post A “No-Brainer” Investment: Proactive Google Safety and Security with Cloud Monitor appeared first on Security Boulevard.
Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack
Налог на прибыль? Нет, на пароли. Новый бэкдор «налоговой» обчищает браузеры российских компаний
USENIX Security参会特辑 | 白泽Security'25 参会小记
CISA Adds Five Known Exploited Vulnerabilities to Catalog
CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
-
CVE-2022-48503 Apple Multiple Products Unspecified Vulnerability
-
CVE-2025-2746 Kentico Xperience Staging Sync Server Digest Password Authentication Bypass Vulnerability
-
CVE-2025-2747 Kentico Xperience Staging Sync Server None Password Type Authentication Bypass Vulnerability
-
CVE-2025-33073 Microsoft Windows SMB Client Improper Access Control Vulnerability
-
CVE-2025-61884 Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Suspected Chinese Hackers Spent a Year-Plus Inside F5 Systems: Report
The suspected Chinese-backed threat actors that hacked into F5's systems and stole data from the security vendor's BIG-IP application suite spent more than a year inside the networks dtbefore being in detected in August, according to a Bloomberg report that cited unnamed sources familiar with the investigation.
The post Suspected Chinese Hackers Spent a Year-Plus Inside F5 Systems: Report appeared first on Security Boulevard.