Aggregator
JavaScript 诞生三十年
Взломал госсистему — получил благодарность. Как превратить уголовную статью в общественно полезное дело (и не сесть)
Critical Cal.com Vulnerability Let Attackers Bypass Authentication Via Fake TOTP Codes
A severe authentication bypass vulnerability has been discovered in cal.com, the popular open-source scheduling platform. Allowing attackers to gain unauthorized access to user accounts by submitting fake TOTP codes. According to GitHub, flaw tracked as CVE-2025-66489, this critical flaw affects versions up to 5.9.7 and has been patched in version 5.9.8. Flawed Authentication Logic Exposes User […]
The post Critical Cal.com Vulnerability Let Attackers Bypass Authentication Via Fake TOTP Codes appeared first on Cyber Security News.
CVE-2025-42620 | CIRCL Vulnerability-Lookup up to 2.17.x related_vulnerabilities cross site scripting (EUVD-2025-201710)
CVE-2025-27020 | Infinera MTC-9 up to 22.x SSH Service missing authentication (EUVD-2025-201700)
US Accounts for 44% of Cyber Attacks; Financial Gain Targets Public Administration
The United States continues to face an unprecedented surge in cyber threats, accounting for nearly half of all documented cyber attacks globally between 2024 and 2025. Recent data from the Cyber Events Database reveals that the US experienced 646 reported incidents during this period, representing 44 percent of all tracked attacks worldwide. This alarming statistic […]
The post US Accounts for 44% of Cyber Attacks; Financial Gain Targets Public Administration appeared first on Cyber Security News.
CVE-2025-66461 | GS Yuasa International FULLBACK Manager Pro Windows Service unquoted search path (EUVD-2025-201699)
CVE-2025-14262 | KNIME Business Hub up to 1.16.x Catalog Service incorrect ownership assignment (EUVD-2025-201697)
AWS: China-linked threat actors weaponized React2Shell hours after disclosure
CVE-2025-27019 | Infinera MTC-9 up to 22.x Remote Shell Service missing authentication (EUVD-2025-201701)
CVE-2025-42616 | CIRCL Vulnerability-Lookup up to 2.17.x cross-site request forgery (EUVD-2025-201708)
CVE-2025-42615 | CIRCL Vulnerability-Lookup up to 2.17.x excessive authentication (EUVD-2025-201703)
Georg Driegen directeur Operatiën bij de Algemene Inlichtingen- en Veiligheidsdienst
Using IPsec to protect data
Space Bears Ransomware Claims Comcast Data Theft Through Quasar Breach
8th December – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 8th December, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The University of Pennsylvania and the University of Phoenix were hit by data breaches after attackers exploited zero-day vulnerabilities in Oracle E-Business Suite servers. At least 1,488 people at UPenn and numerous […]
The post 8th December – Threat Intelligence Report appeared first on Check Point Research.
The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel
The Kitten Project has emerged as a coordinated hacktivist platform operating at the intersection of activism and technical operations. This initiative represents a shift in how cyber-focused groups organize their campaigns, moving beyond isolated attacks toward centralized infrastructure that facilitates communication, resource sharing, and coordinated action. The platform, accessible through thekitten.group, serves as a hub […]
The post The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel appeared first on Cyber Security News.