Aggregator
CVE-2025-39837 | Linux Kernel up to 6.16.5/6.17-rc4 asus_wmi_register_driver race condition
CVE-2025-39846 | Linux Kernel up to 6.17-rc4 pcmcia __iodyn_find_io_region null pointer dereference
CVE-2025-39844 | Linux Kernel up to 6.17-rc4 linux/pgtable.h __populate_section_memmap denial of service
CVE-2025-39845 | Linux Kernel up to 6.17-rc4 arch_sync_kernel_mappings memory corruption
CVE-2025-39843 | Linux Kernel up to 6.1.150/6.6.104/6.12.45/6.16.5/6.17-rc4 slub set_track_prepare allocation of resources
Phishing Attacks Using AI-Powered Platforms to Misleads Users and Evades Security Tools
Phishing campaigns have long relied on social engineering to dupe unsuspecting users, but recent developments have elevated these attacks to a new level of sophistication. Attackers now harness advanced content-generation platforms to craft highly personalized emails and webpages, blending genuine corporate branding with contextually relevant messages. These platforms analyze public social media profiles, corporate press […]
The post Phishing Attacks Using AI-Powered Platforms to Misleads Users and Evades Security Tools appeared first on Cyber Security News.
UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware
Следы древних микробов на Марсе? Камни Езеро намекают на жизнь, погребённую в осадках
SecWiki News 2025-09-19 Review
G.O.S.S.I.P 阅读推荐 2025-09-19 当AirTag从找钥匙神器变成跟踪工具:一项让人后背发凉的安全研究
Top 10 Best API Security Testing Tools in 2025
In today’s rapidly evolving digital landscape, APIs (Application Programming Interfaces) have become the backbone of online business, connecting services, and enabling new customer experiences. However, as the API footprint grows, so does the attack surface making robust API security testing a critical pillar of enterprise cyber defense in 2025. Whether you’re a security analyst, DevSecOps […]
The post Top 10 Best API Security Testing Tools in 2025 appeared first on Cyber Security News.
Nokia CBIS/NCS Manager API Vulnerability Let Attackers Bypass Authentication
A critical authentication bypass vulnerability has emerged in Nokia’s CloudBand Infrastructure Software (CBIS) and Nokia Container Service (NCS) Manager API, designated as CVE-2023-49564. This high-severity flaw, scoring 9.6 on the CVSS v3.1 scale, enables unauthorized attackers to circumvent authentication mechanisms through specially crafted HTTP headers, potentially granting complete access to restricted API endpoints without valid […]
The post Nokia CBIS/NCS Manager API Vulnerability Let Attackers Bypass Authentication appeared first on Cyber Security News.
CISA exposes malware kits deployed in Ivanti EPMM attacks
狗能根据玩具功能对其进行分类
Trump administration planning expansion of U.S. quantum strategy
Multiple sources tell CyberScoop that options under consideration include executive orders or a national action plan, similar to the one the administration released for AI in July.
The post Trump administration planning expansion of U.S. quantum strategy appeared first on CyberScoop.
Russian Hacking Groups Gamaredon and Turla Attacking Organizations to Deploy Kazuar Backdoor
In early 2025, cybersecurity researchers observed an unprecedented collaboration between two Russian APT groups targeting Ukrainian organizations. Historically, Gamaredon has focused on broad spear-phishing campaigns against government and critical infrastructure, while Turla has specialized in high-value cyberespionage using sophisticated implants. Their joint operations mark a significant escalation: Gamaredon gains initial access using its established toolkit, […]
The post Russian Hacking Groups Gamaredon and Turla Attacking Organizations to Deploy Kazuar Backdoor appeared first on Cyber Security News.