Aggregator
CVE-2025-57819 | FreePBX up to 15.0.65/16.0.88/17.0.2 sql injection (GHSA-m42g-xg4c-5f3h)
CVE-2024-13986 | Nagios XI up to 2024R1.3.1 Config Snapshots Interface unrestricted upload
Akira, Cl0p Top List of 5 Most Active Ransomware-as-a-Service Groups
El 60 % fracasa. ¿También usted?
Qué revela FireMon Insights sobre los riesgos de las políticas de firewall y cómo evitarlos La gestión del firewall es el héroe olvidado (o el villano oculto) de la seguridad...
The post El 60 % fracasa. ¿También usted? appeared first on Security Boulevard.
CVE-2025-9619 | E4 Sistemas Mercatus ERP 2.00.019 id resource injection
Submit #636623: e4sistemas Mercatus ERP v 2.00.019 Insecure Direct Object Reference (IDOR) [Accepted]
CVE-2025-8901 | Google Chrome up to 139.0.7258.66 ANGLE out-of-bounds write (ID 435139 / EUVD-2025-24536)
CVE-2024-22314 | IBM Storage Defender up to 2.0.12 Resiliency Service risky encryption (EUVD-2024-19875)
CVE-2025-8879 | Google Chrome up to 139.0.7258.66 libaom heap-based overflow (ID 432035 / EUVD-2025-24538)
CVE-2025-8010 | Google Chrome up to 138.0.7204.157 V8 type confusion (ID 430344 / EUVD-2025-22356)
CVE-2025-8011 | Google Chrome up to 138.0.7204.157 V8 type confusion (ID 430572 / EUVD-2025-22355)
CVE-2025-2947 | IBM i 7.6 insecure preserved inherited permissions (EUVD-2025-11553)
CVE-2025-2950 | IBM i 7.3/7.4/7.5/7.6 domain/IP address http headers for scripting syntax (EUVD-2025-11872)
1,000+ Devs Lose Their Secrets to an AI-Powered Stealer
CVE-2025-43300 | Apple iOS/iPadOS Image File out-of-bounds write (EUVD-2025-25409)
Procedures Make It Possible
At this year's Black Hat USA conference, Scott Small, Director of Cyber Threat Intelligence, and Harrison Van Riper, Director of Artificial Intelligence, put together a talk entitled "Procedures Make It Possible: Solving One of Cybersecurity's Most Persistent Challenges", and Scott Small presented it to an engaged crowd (Harrison was unfortunately unable to attend at the last minute).
The post Procedures Make It Possible appeared first on Security Boulevard.
Слухи как вирус, математика как лекарство. Учёные просчитали механику «Великого страха» 1789 года
Google shares workarounds for auth failures on ChromeOS devices
Ransom Tales: Volume III – Emulating INC, Lynx and SafePay Ransomware
AttackIQ presents the third volume of Ransom Tales, an initiative focused on emulating the Tactics, Techniques, and Procedures (TTPs) exhibited by sophisticated and prominent ransomware families with the objective of empowering defenders to rigorously challenge their security controls and enhance resilience against disruptive and extortive threats. In this release, AttackIQ presents three new attack graphs that emulate the behaviors exhibited by the INC, Lynx and SafePay ransomware families.
The post Ransom Tales: Volume III – Emulating INC, Lynx and SafePay Ransomware appeared first on AttackIQ.
The post Ransom Tales: Volume III – Emulating INC, Lynx and SafePay Ransomware appeared first on Security Boulevard.