Aggregator
CVE-2025-39247 | Hikvision HikCentral Professional 3.0.0 access control
CVE-2025-39245 | Hikvision HikCentral Master Lite csv injection
How Hackers Really Used Infostealers for the Biggest Recent Cyber Breaches
CVE-2025-8861 | Changing TSA up to 1/5 missing authentication
CVE-2025-8858 | Changing Clinic Image System up to 2.4.23.2131 sql injection (EUVD-2025-26168)
CVE-2025-43284 | Apple macOS up to 13.6/14.6/15.5 out-of-bounds
CVE-2025-39246 | Hikvision HikCentral FocSign unquoted search path
CVE-2025-58062 | LSTM-Kirigaya openmcp-client up to 0.1.11 open os command injection (GHSA-43m4-p3rv-c4v8)
CVE-2025-43187 | Apple macOS up to 13.6/14.6/15.5 hdiutil Local Privilege Escalation
CVE-2025-54142 | Akamai Ghost 2025-03-26 request smuggling
CVE-2025-53508 | iND HL330-DLS Product Name os command injection (dceid-2025-001)
CVE-2025-9639 | Ai3 QbiCRMGateway up to 8.5.03 path traversal
CVE-2025-53507 | iND HL330-DLS sensitive information (dceid-2025-001)
CVE-2025-8857 | Changing Clinic Image System up to 2.4.23.2131 hard-coded credentials
CVE-2025-58061 | openebs rawfile-localpv up to 0.9.x /var/csi/rawfile/ information disclosure (GHSA-wh95-vw4r-xwx4)
Ваш ИИ-помощник теперь умеет предавать. Claude научили слушаться скрытых команд с сайтов
Finding connection and resilience as a CISO
With sensitive information to protect and reputational risk always in the background, it isn’t easy for security leaders to have open conversations about what’s working and what isn’t. Yet strong peer networks and candid exchanges are critical for resilience, both organizationally and personally. In this Help Net Security interview, Michael Green, CISO at Trellix, discusses how CISOs can build trusted communities, balance information sharing with confidentiality, and avoid burnout while leading at the highest level. … More →
The post Finding connection and resilience as a CISO appeared first on Help Net Security.
Organized and Criminal, Ransomware Gangs Run Up Profits
Ransomware attacks are rising 49% as cyber gangs evolve into organized criminal enterprises. With over 200 groups operating like corporations — recruiting talent, using RaaS models, and deploying multi-extortion tactics — defenders must strengthen foundational controls, limit vendor access, and prioritize vulnerability management to stay ahead.
The post Organized and Criminal, Ransomware Gangs Run Up Profits appeared first on Security Boulevard.