Aggregator
ZDI-CAN-27974: Autodesk
ZDI-CAN-27956: GPT Academic
ZDI-CAN-27957: GPT Academic
JVN: SS1における複数の脆弱性
CVE-2024-49740 | Google Android 12/12L/13/14/15 resource consumption
CVE-2025-57820 | sveltejs devalue up to 5.3.1 devalue.parse prototype pollution (GHSA-vj54-72f3-p5jv)
CVE-2025-0081 | Google Android 12/12L/13/14/15 dng_lossless_jpeg.cpp HuffDecode denial of service
CVE-2025-22412 | Google Android 15 sdp_server.cc use after free
CVE-2025-22408 | Google Android 15 rfc_utils.cc rfc_check_send_cmd use after free
CVE-2025-0093 | Google Android 12/12L/13/14/15 AdapterService.java handleBondStateChanged information disclosure
CVE-2025-0092 | Google Android 12/12L/13/14/15 UI AdapterService.java handleBondStateChanged information disclosure
CVE-2025-0084 | Google Android 13/14/15 Bluetooth out-of-bounds write
CVE-2025-0075 | Google Android 15 sdp_server.cc process_service_search_attr_req use after free
CVE-2025-22411 | Google Android 15 sdp_discovery.cc process_service_attr_rsp use after free
CVE-2025-22403 | Google Android 15 sdp_discovery.cc sdp_snd_service_search_req use after free
CVE-2025-0074 | Google Android 15 sdp_discovery.cc process_service_attr_rsp use after free
The One Where We Just Steal The Vulnerabilities (CrushFTP CVE-2025-54309)
China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled
China-based threat actor Mustang Panda has emerged as one of the most sophisticated cyber espionage groups operating in the current threat landscape, with operations dating back to at least 2014. This advanced persistent threat (APT) group has systematically targeted government entities, nonprofit organizations, religious institutions, and NGOs across the United States, Europe, Mongolia, Myanmar, Pakistan, […]
The post China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled appeared first on Cyber Security News.
What CISOs can learn from Doppel’s new AI-driven social engineering simulation
Doppel has introduced a new product called Doppel Simulation, which expands its platform for defending against social engineering. The tool uses autonomous AI agents to create multi-channel simulations that mirror how attackers operate across email, SMS, messaging apps, and soon voice. The goal is to move beyond legacy phishing tests that rely on email click rates and instead measure resilience across a broader set of real-world attack paths. For CISOs, the launch represents a shift … More →
The post What CISOs can learn from Doppel’s new AI-driven social engineering simulation appeared first on Help Net Security.