Aggregator
CVE-2026-0012 | Google Android 14/15/16 ExpandableNotificationRow.java setHideSensitive information disclosure
CVE-2026-0014 | Google Android 14/15/16/16-qpr2 AppOpsService.java isPackageNullOrSystem denial of service
CVE-2026-0015 | Google Android 14/15/16/16-qpr2 AppOpsService.java denial of service
CVE-2026-0011 | Google Android 14/15/16/16-qpr2 Settings.java enableSystemPackageLPw protection mechanism
CVE-2026-0010 | Google Android 14/15/16 IDrmManagerService.cpp onTransact out-of-bounds write
CVE-2026-0017 | Google Android 16/16-qpr2 BiometricService.java onChange improper authorization
CVE-2026-0013 | Google Android 14/15/16 PickActivity.java setupLayout confused deputy
CVE-2026-28289 | freescout-help-desk freescout up to 1.8.206 .htaccess sanitizeUploadedFileName unrestricted upload (GHSA-5gpc-65p8-ffwp)
CVE-2026-27971 | QwikDev qwik up to 1.19.0 HTTP Request require deserialization (GHSA-p9x5-jp3h-96mm)
CVE-2026-3266 | OpenText Filr up to 25.1.2 authorization
CVE-2026-0007 | Google Android 14/15/16 WindowInfo.cpp writeToParcel permission
当 AI Agent 拥有系统权限:OpenClaw 安全风险全景分析
What Is Address Poisoning
As cryptocurrency adoption continues to grow, so do the tactics used by cybercriminals to exploit users. One of the emerging threats in the blockchain ecosystem is address poisoning — a subtle yet highly deceptive attack designed to trick users into sending funds to fraudulent wallet addresses. Unlike traditional hacking methods that rely on breaching systems, […]
The post What Is Address Poisoning first appeared on StrongBox IT.
The post What Is Address Poisoning appeared first on Security Boulevard.
日本首次批准 iPS 细胞再生医疗产品
Network Decapitation: Cisco Warns of Active SD-WAN Zero-Day Exploits and Chained Attacks
Cisco has issued a stark admonition regarding sustained cyber offensives wherein malicious actors are actively exploiting vulnerabilities within
The post Network Decapitation: Cisco Warns of Active SD-WAN Zero-Day Exploits and Chained Attacks appeared first on Penetration Testing Tools.
The Fall of a Phishing Giant: How International Law Enforcement Crushed the Tycoon 2FA Empire
An international law enforcement operation has successfully dismantled Tycoon 2FA, one of the most formidable phishing-as-a-service platforms in
The post The Fall of a Phishing Giant: How International Law Enforcement Crushed the Tycoon 2FA Empire appeared first on Penetration Testing Tools.
Hackers Can Use Indirect Prompt Injection Allows Adversaries to Manipulate AI Agents with Content
Artificial intelligence tools are now a core part of everyday workflows — from browsers that summarize web pages to automated agents that help users make decisions online. As these tools become more capable, attackers are learning how to turn them against the very people they are designed to serve. A method called indirect prompt injection […]
The post Hackers Can Use Indirect Prompt Injection Allows Adversaries to Manipulate AI Agents with Content appeared first on Cyber Security News.