Aggregator
CVE-2025-8011 | Google Chrome up to 138.0.7204.157 V8 type confusion (ID 430572 / EUVD-2025-22355)
CVE-2025-2947 | IBM i 7.6 insecure preserved inherited permissions (EUVD-2025-11553)
CVE-2025-2950 | IBM i 7.3/7.4/7.5/7.6 domain/IP address http headers for scripting syntax (EUVD-2025-11872)
1,000+ Devs Lose Their Secrets to an AI-Powered Stealer
Procedures Make It Possible
At this year's Black Hat USA conference, Scott Small, Director of Cyber Threat Intelligence, and Harrison Van Riper, Director of Artificial Intelligence, put together a talk entitled "Procedures Make It Possible: Solving One of Cybersecurity's Most Persistent Challenges", and Scott Small presented it to an engaged crowd (Harrison was unfortunately unable to attend at the last minute).
The post Procedures Make It Possible appeared first on Security Boulevard.
Слухи как вирус, математика как лекарство. Учёные просчитали механику «Великого страха» 1789 года
Google shares workarounds for auth failures on ChromeOS devices
Ransom Tales: Volume III – Emulating INC, Lynx and SafePay Ransomware
AttackIQ presents the third volume of Ransom Tales, an initiative focused on emulating the Tactics, Techniques, and Procedures (TTPs) exhibited by sophisticated and prominent ransomware families with the objective of empowering defenders to rigorously challenge their security controls and enhance resilience against disruptive and extortive threats. In this release, AttackIQ presents three new attack graphs that emulate the behaviors exhibited by the INC, Lynx and SafePay ransomware families.
The post Ransom Tales: Volume III – Emulating INC, Lynx and SafePay Ransomware appeared first on AttackIQ.
The post Ransom Tales: Volume III – Emulating INC, Lynx and SafePay Ransomware appeared first on Security Boulevard.
CVE-2024-36882 | Linux Kernel up to 6.1.90/6.6.30/6.8.9 hung_task_timeout_secs memalloc_nofs_save deadlock (WID-SEC-2024-1259)
CVE-2024-36033 | Linux Kernel up to 6.8.9 Bluetooth memory leak (WID-SEC-2024-1259)
CVE-2024-36880 | Linux Kernel up to 5.15.158/6.1.90/6.6.30/6.8.9 Bluetooth buffer overflow (Nessus ID 237324 / WID-SEC-2024-1259)
CVE-2024-36881 | Linux Kernel up to 6.6.30/6.8.9 userfaultfd close memory corruption (377f3a9a3d03/8d8b68a5b0c9/c88033efe9a3 / WID-SEC-2024-1259)
CVE-2020-12823 | OpenConnect 8.09 gnutls.c get_cert_name Crafted Certificate buffer overflow (Nessus ID 257997)
CVE-2022-22637 | Apple Safari up to 15.3 WebKit cross-domain policy (HT213187 / EUVD-2022-27782)
CVE-2024-36031 | Linux Kernel up to 6.9.0 a key past its expiration date (Nessus ID 209785 / WID-SEC-2024-1259)
CVE-2024-36032 | Linux Kernel up to 6.1.90/6.6.30/6.8.9 Bluetooth stack-based overflow (Nessus ID 207738 / WID-SEC-2024-1259)
CVE-2022-22637 | Apple macOS WebKit cross-domain policy (HT213183 / EUVD-2022-27782)
Rhysida
You must login to view this content