Aggregator
CVE-2023-28202 | Apple macOS up to 13.3 System Settings state issue (HT213758 / EUVD-2023-31910)
CVE-2023-28202 | Apple iOS/iPadOS up to 16.4.1 System Settings state issue (HT213757 / EUVD-2023-31910)
UK Ransomware Payment Ban to Come with Exemptions, Security Minster Say
CVE-2025-13342 | DynamiApps Frontend Admin Plugin up to 3.28.20 on WordPress ActionOptions::run authorization
CVE-2025-13109 | Husky Plugin up to 1.3.7.2 on WordPress woof_add_query/woof_remove_query resource injection
CVE-2025-12358 | ShopEngine Plugin up to 4.8.5 on WordPress Wishlist post_add_to_list cross-site request forgery
CVE-2025-12887 | Post SMTP Plugin up to 3.6.1 on WordPress handle_gmail_oauth_redirect authorization
University of Phoenix discloses data breach after Oracle hack
Researchers spotted Lazarus’s remote IT workers in action
Benzona
You must login to view this content
Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say
A sprawling network that’s seemingly maintained to serve (illegal) online gambling opportunities and deliver malware to Indonesian citizens is likely also being used to provide threat actors command and control (C2) and anonymity services. “The infrastructure has been active for at least 14 years and currently spans 328,039 domains: 236,433 purchased domains, 90,125 hacked websites, and 1,481 hijacked subdomains, including subdomains of government websites,” says Kobi Ben Naim, CEO and Head of Research at Malanta. … More →
The post Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say appeared first on Help Net Security.
От сталинских высоток до африканских хижин — немцы построили самую полную 3D-карту 2,75 млрд зданий мира
印度政府撤回了在手机预装政府网络安全应用的命令
Ни дизайна, ни рекламы, ни контента. Как пустая страница в интернете набрала 30 тысяч просмотров за месяц (и чем это опасно)
«Сигнал услышан не был». Депутат Горелкин объяснил сбой в Roblox действиями Роскомнадзора
CISA Warns of Android 0-Day Vulnerability Exploited in Attacks
CISA has added two critical Android Framework vulnerabilities to its Known Exploited Vulnerabilities catalog, signaling active exploitation in the wild. The vulnerabilities affect the Android OS and pose significant risks to millions of mobile devices worldwide. CISA added the vulnerabilities to its KEV catalog on December 2, 2025, requiring federal agencies and critical infrastructure operators […]
The post CISA Warns of Android 0-Day Vulnerability Exploited in Attacks appeared first on Cyber Security News.
MuddyWater Attacks Critical Infrastructure With Custom Malware and Improved Tactics
MuddyWater, an Iran-aligned cyberespionage group also known as Mango Sandstorm, has launched a new, highly targeted campaign against critical infrastructure in Israel and Egypt. Active from September 2024 through March 2025, the group zeroed in on diverse sectors including engineering, utilities, local government, and technology. This operation marks a distinct evolution in their operational maturity, […]
The post MuddyWater Attacks Critical Infrastructure With Custom Malware and Improved Tactics appeared first on Cyber Security News.
特朗普政府再次以投资方式获得企业股份
Ransom House
You must login to view this content