Aggregator
CVE-2025-57820 | sveltejs devalue up to 5.3.1 devalue.parse prototype pollution (GHSA-vj54-72f3-p5jv)
CVE-2025-0081 | Google Android 12/12L/13/14/15 dng_lossless_jpeg.cpp HuffDecode denial of service
CVE-2025-22412 | Google Android 15 sdp_server.cc use after free
CVE-2025-22408 | Google Android 15 rfc_utils.cc rfc_check_send_cmd use after free
CVE-2025-0093 | Google Android 12/12L/13/14/15 AdapterService.java handleBondStateChanged information disclosure
CVE-2025-0092 | Google Android 12/12L/13/14/15 UI AdapterService.java handleBondStateChanged information disclosure
CVE-2025-0084 | Google Android 13/14/15 Bluetooth out-of-bounds write
CVE-2025-0075 | Google Android 15 sdp_server.cc process_service_search_attr_req use after free
CVE-2025-22411 | Google Android 15 sdp_discovery.cc process_service_attr_rsp use after free
CVE-2025-22403 | Google Android 15 sdp_discovery.cc sdp_snd_service_search_req use after free
CVE-2025-0074 | Google Android 15 sdp_discovery.cc process_service_attr_rsp use after free
The One Where We Just Steal The Vulnerabilities (CrushFTP CVE-2025-54309)
China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled
China-based threat actor Mustang Panda has emerged as one of the most sophisticated cyber espionage groups operating in the current threat landscape, with operations dating back to at least 2014. This advanced persistent threat (APT) group has systematically targeted government entities, nonprofit organizations, religious institutions, and NGOs across the United States, Europe, Mongolia, Myanmar, Pakistan, […]
The post China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled appeared first on Cyber Security News.
What CISOs can learn from Doppel’s new AI-driven social engineering simulation
Doppel has introduced a new product called Doppel Simulation, which expands its platform for defending against social engineering. The tool uses autonomous AI agents to create multi-channel simulations that mirror how attackers operate across email, SMS, messaging apps, and soon voice. The goal is to move beyond legacy phishing tests that rely on email click rates and instead measure resilience across a broader set of real-world attack paths. For CISOs, the launch represents a shift … More →
The post What CISOs can learn from Doppel’s new AI-driven social engineering simulation appeared first on Help Net Security.
107 удалённых команд и полноэкранные «шифровки». Банковский троян HOOK превратился в универсальное оружие хакеров
Securden Unified PAM Vulnerability Let Attackers Bypass Authentication
Cybersecurity researchers have uncovered a critical security flaw in Securden Unified PAM that allows attackers to completely bypass authentication mechanisms and gain unauthorized access to sensitive credentials and system functions. The vulnerability, designated as CVE-2025-53118 with a CVSS score of 9.4, represents one of four serious security issues discovered in the privileged access management solution […]
The post Securden Unified PAM Vulnerability Let Attackers Bypass Authentication appeared first on Cyber Security News.
JVN: 複数のSchneider Electric製品における不適切な入力検証の脆弱性
Social media apps that aggressively harvest user data
Both domestic and foreign technology companies collect vast amounts of Americans’ personal data through mobile applications, according to Incogni. Some apps leverage data for marketing and advertising purposes, feeding algorithms to calculate optimal prices based on consumer behavior, often leading to unwanted spending. Other apps share user data with unnamed third parties, increasing the risk of breaches with every additional recipient. Additionally, there is the threat of government appropriation of this data. Recently, foreign-owned apps … More →
The post Social media apps that aggressively harvest user data appeared first on Help Net Security.