Aggregator
CVE-2025-66270 | KDE Connect Protocol 8 authentication spoofing
CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
CVE-2025-32900 | KDE Connect information-exchange Protocol prior 2025-04-18 less trusted source
Три часа тишины. Android начнет задерживать СМС с кодами, чтобы защитить вас
CVE-2025-27389 | ColorOS up to 15 Installation authentication spoofing
CVE-2025-32898 | KDE Connect verification-code Protocol entropy
从“被动合规”到“主动运营”:漏洞风险例外管理机制实践
为什么安全意识培训“没用”?研究揭示问题根源与改进方向
Beware of Solana Phishing Attacks That Let Hackers Initiate Unauthorized Account Transfer
A dangerous new wave of phishing attacks is targeting Solana users by changing wallet ownership permissions rather than stealing private keys. A victim lost more than USD 3 million in a single attack, with an additional USD 2 million locked in investment platforms. What makes this attack unique is that the user’s funds remained visible […]
The post Beware of Solana Phishing Attacks That Let Hackers Initiate Unauthorized Account Transfer appeared first on Cyber Security News.
自组装轻型飞机因 3D 打印零部件受热软化而坠机
斯巴鲁车主抱怨驾车过程中弹出全屏广告
Cacti Command Injection Vulnerability Let Attackers Execute Malicious Code Remotely
A critical command injection vulnerability in the open-source network monitoring tool Cacti allows authenticated attackers to execute arbitrary code remotely, potentially compromising the entire monitoring infrastructure. The flaw, tracked as CVE-2025-66399, affects all versions up to 1.2.28 and stems from inadequate input validation in the SNMP device configuration functionality. The vulnerability resides in the device […]
The post Cacti Command Injection Vulnerability Let Attackers Execute Malicious Code Remotely appeared first on Cyber Security News.
Написан за 10 дней, чиним 30 лет: С днем рождения, наш любимый JavaScript
【追更】已支持回显验证!新爆CVE-2025-55182 PoC可无条件利用,Dify受影响严重
Weekly Update 481
Twelve years (and one day) since launching Have I Been Pwned, it's now a service that Charlotte and I live and breathe every day. From the first thing every morning to the last thing each day, from holidays to birthdays, in sickness and in heal... wait a minute
Миф о юных гениях разрушен. Реальный хакер — это ваш 40-летний сосед
在拉斯维加斯,我看到了体育的未来
Breach Roundup: React Flaw Incites Supply Chain Risk
This week, the React flaw, a belated Windows fix, Defense Secretary Pete Hegseth's Signal group posed operational risk, more North Korean npm packages. An Australian jailed for Wi-Fi "evil twin" crimes. The US FTC will send $15.3 million to Avast users. A London council said attackers stole data.
Brickstorm Malware Hits US Critical Systems, CISA Warns
U.S. and Canadian cyber authorities say Chinese state-backed actors used a backdoor dubbed BRICKSTORM to maintain long-term access into critical infrastructure, exploiting VMware environments to exfiltrate credentials and evade detection through encrypted covert channels.