Aggregator
CVE-2025-31163 | xfig fig2dev 3.2.9a via put_patternarc null pointer dereference
CVE-2025-31162 | xfig fig2dev 3.2.9a via get_slope divide by zero
Russian authorities arrest three suspects behind Mamont Android banking trojan
Oracle Still Denies Breach as Researchers Persist
Weekly Threat Landscape Digest – Week 13
This week’s cybersecurity landscape underscores the increasing complexity of today’s threats and the critical importance of maintaining a proactive, layered […]
The post Weekly Threat Landscape Digest – Week 13 appeared first on HawkEye.
RansomHub
StealthCup
Date: March 28, 2025, 7 a.m. — 28 March 2025, 15:00 UTC [add to calendar]
Format: Hack quest
On-site
Location: Vienna, Austria / Hybrid (Online)
Offical URL: https://stealth.ait.ac.at/
Rating weight: 0
Event organizers: 0x01DA
2025 Advanced Persistent Bot Report: Scraper Bots Deep-Dive
Esri security advisory (AV25-171)
OpenAI now pays researchers $100,000 for critical vulnerabilities
Harmonic Security Raises $17.5M Series A to Accelerate Zero-Touch Data Protection to Market
Почему Firefox срочно обновили — и при чём тут взлом Chrome
Traditional Data Loss Prevention Solutions Are Not Working for Most Organizations
Why Cause Chaos? The Benefits of Having a “Chaos Day”
“The best-laid plans of mice and men often go awry.” - Robert Burns, Scottish poet
The post Why Cause Chaos? The Benefits of Having a “Chaos Day” appeared first on Security Boulevard.
SecurityScorecard 2025 Global Third-Party Breach Report Reveals Surge in Vendor-Driven Attacks
Malaysia PM Refuses to Pay $10M Ransomware Demand
Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands
Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed “Morphing Meerkat,” that leverages DNS mail exchange (MX) records to dynamically serve tailored phishing pages mimicking over 100 brands. The platform, which has been operational since at least January 2020, employs a range of advanced techniques to evade detection and maximize the effectiveness of its […]
The post Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Modern Security Testing – Leveling up the Crash Test Dummy
One thing not often thought of is the lowly crash test dummy. Traditionally, crash test dummies were modeled after male bodies leading to vehicle safety standards and designs being disproportionately geared towards protecting male passengers. As a result, studies found that women and children suffered more significant injuries more frequently in car crashes. Similarly, [...]
The post Modern Security Testing – Leveling up the Crash Test Dummy appeared first on Hurricane Labs.
The post Modern Security Testing – Leveling up the Crash Test Dummy appeared first on Security Boulevard.