Aggregator
CVE-2025-8006 | Ashlar-Vellum Cobalt XE File Parser out-of-bounds (EUVD-2025-29782)
CVE-2025-8001 | Ashlar-Vellum Cobalt CO File Parser memory corruption (EUVD-2025-29786)
CVE-2025-8002 | Ashlar-Vellum Cobalt CO File Parser type confusion (EUVD-2025-29783)
CVE-2025-7993 | Ashlar-Vellum Cobalt LI File Parser use after free (EUVD-2025-29781)
CVE-2025-8005 | Ashlar-Vellum Cobalt XE File Parser type confusion (EUVD-2025-29785)
ShinyHunters claims 1.5 billion Salesforce records stolen in Drift hacks
Qilin
You must login to view this content
How NHIs Can Help You Relax About Security
Navigating the Landscape of Cybersecurity: Do NHIs Hold the Key? Are you searching for a stress-free solution to safeguard your organization’s data? Understanding the intricacies of Non-Human Identities (NHIs) and Secrets Security Management can offer immense value, providing a promising pathway to achieving NHI security relaxation. Understanding NHIs: The Unseen Protectors What lurks beneath often […]
The post How NHIs Can Help You Relax About Security appeared first on Entro.
The post How NHIs Can Help You Relax About Security appeared first on Security Boulevard.
Getting Better Results from NHI Security
How Can We Achieve Better NHI Security? Cloud environment security is an integral part of cybersecurity strategies for businesses operating across financial services, healthcare, travel, and more. How can organizations unlock improved results and ensure robust Non-Human Identities (NHIs) security? A strategic approach to NHI management can bridge the gap between security and research & […]
The post Getting Better Results from NHI Security appeared first on Entro.
The post Getting Better Results from NHI Security appeared first on Security Boulevard.
CVE-2024-32652 | honojs node-server up to 1.10.0 exceptional condition (ID 159)
CVE-2024-32869 | hono 1.3.0/1.4.0/3.11.7 serveStatic path traversal
CVE-2025-58448 | rAthena PartyBooking WorldName sql injection (GHSA-x99j-36m7-4vv7)
CVE-2025-58750 | rAthena chclif_parse_moveCharSlot memory corruption (GHSA-pjh7-jgr8-4ff6)
CVE-2025-43884 | Dell PowerProtect Data Manager 19.19/19.20 os command injection (dsa-2025-326 / EUVD-2025-27580)
CVE-2024-48913 | hono up to 4.6.4 Content-Type Header cross-site request forgery (GHSA-2234-fmw7-43wr)
MuddyWater Hackers Using Custom Malware With Multi-Stage Payloads and Uses Cloudflare to Mask Fingerprints
Since early 2025, cybersecurity teams have observed a marked resurgence in operations attributed to MuddyWater, an Iranian state–sponsored advanced persistent threat (APT) actor. Emerging initially through broad remote monitoring and management (RMM) exploits, the group has pivoted to highly targeted campaigns employing custom malware backdoors and multi-stage payloads designed to evade detection. Rather than relying […]
The post MuddyWater Hackers Using Custom Malware With Multi-Stage Payloads and Uses Cloudflare to Mask Fingerprints appeared first on Cyber Security News.
China-linked APT41 targets government, think tanks, and academics tied to US-China trade and policy
Attack on SonicWall’s cloud portal exposes customers’ firewall configurations
The company confirmed to CyberScoop that an unidentified cybercriminal accessed SonicWall’s customer portal through a series of brute-force attacks.
The post Attack on SonicWall’s cloud portal exposes customers’ firewall configurations appeared first on CyberScoop.
Zero Day Malware
Cybersecurity is a race against time. Every day, businesses face sophisticated threats designed to exploit the smallest vulnerabilities. Among the most dangerous of these are Zero Day Malware attacks — malicious software that targets unknown flaws before vendors or defenders even know they exist. Zero day malware represents the pinnacle of stealth and danger. Unlike
The post Zero Day Malware appeared first on Seceon Inc.
The post Zero Day Malware appeared first on Security Boulevard.