Aggregator
12Storeez, «Неофарм» и «Аэрофлот»: громкие атаки лета станут темой CyberLink Conf в Москве.
Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code
A critical security vulnerability has been discovered in Rockwell Automation’s ControlLogix Ethernet communication modules, potentially allowing remote attackers to execute arbitrary code on industrial control systems. The vulnerability, tracked as CVE-2025-7353, affects multiple ControlLogix Ethernet modules and carries a maximum CVSS score of 9.8, indicating severe security implications for industrial automation environments. Key Takeaways1. Critical […]
The post Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code appeared first on Cyber Security News.
What is Use-After-Free Vulnerability? – Impact and Mitigation
Use-after-free (UAF) vulnerabilities represent one of the most critical and prevalent security threats in modern software systems, particularly affecting applications written in memory-unsafe languages like C and C++. These vulnerabilities occur when a program continues to use a memory location after it has been freed, creating opportunities for attackers to manipulate program execution flow, corrupt […]
The post What is Use-After-Free Vulnerability? – Impact and Mitigation appeared first on Cyber Security News.
CVE-2023-3865 | Linux Kernel ksmbd fs/ksmbd/smb2misc.c ksmbd_smb2_check_message out-of-bounds (WID-SEC-2025-1858)
CVE-2023-3866 | Linux Kernel ksmbd null pointer dereference (WID-SEC-2025-1858)
CVE-2020-24588 | Microsoft Windows up to Server 2019 Wireless Networking (WID-SEC-2025-1858)
CVE-2025-48989 | Apache Tomcat up to 8.5.100/9.0.107/10.1.43/11.0.9 HTTP/2 denial of service (EUVD-2025-24559 / Nessus ID 249345)
CVE-2025-8671 | IETF HTTP Working Group Fastly H20/HTTP/2 Stream Reset MadeYouReset resource consumption (VU#767506 / EUVD-2025-24560)
【复现】SmartBi远程代码执行漏洞风险通告
奇安信斩获首届CCF智能汽车大赛“汽车安全攻防赛”一等奖
Sandy Coast: explosieven verwijderen en kabels beschermen
DARPA AI Cyber Challenge Winners Impress With Quick, Scalable Patching
Winners of DARPA’s AI Cyber Challenge proved AI can automate patching at scale. Their tools will go open source, offering defenders new power—but also raising concerns about AI-fueled exploits.
The post DARPA AI Cyber Challenge Winners Impress With Quick, Scalable Patching appeared first on Security Boulevard.