Aggregator
CVE-2025-13184 | TOTOLINK AX1800 cstecgi.cgi?action=telnet missing authentication (EUVD-2025-202419)
CVE-2020-36882 | Flexsense DiskBoss 7.7.14 /Command/Search Files/Directory unrestricted upload (Exploit 48276 / EDB-48276)
CVE-2025-66570 | yhirose cpp-httplib up to 0.26.x Request Header httplib.h read_headers authentication spoofing (GHSA-xm2j-vfr9-mg9m / Nessus ID 277659)
Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece
«Байки у горящего сервака», споры о страховке и новые метрики. О чем говорили 250 лучших экспертов по кибербезопасности.
Публичный DNS и внутренние IP: удобство, которое превращается в вектор атаки
Why a secure software development life cycle is critical for manufacturers
New Spiderman phishing service targets dozens of European banks
US charges hacker tied to Russian groups that targeted water systems and meat plants
Victoria Dubranova faces charges tied to her alleged role in two groups backed by the Russian government.
The post US charges hacker tied to Russian groups that targeted water systems and meat plants appeared first on CyberScoop.
CVE-2023-53821 | Linux Kernel up to 6.4.11 ip6_vti use after free (Nessus ID 278011)
CVE-2023-53858 | Linux Kernel up to 6.4.4 tty s3c24xx_serial_getclk memory leak (Nessus ID 278012)
CVE-2023-53863 | Linux Kernel up to 6.4.3 netlink lib/iov_iter.c privilege escalation (Nessus ID 278013)
CVE-2024-38798 | TianoCore EDK2 up to <=stable202505 information disclosure (Nessus ID 278014)
New EtherRAT backdoor surfaces in React2Shell attacks tied to North Korea
Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits
Highlights: Introduction Throughout 2025, we conducted and published several reports related to our research on the Silver Fox APT. In some of them (for example, here), the threat actor delivered the well-known ValleyRAT backdoor, also referred to as Winos or Winos4.0, as the final stage. Since this malware family is widely used, modular, and often associated with Chinese threat actors […]
The post Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits appeared first on Check Point Research.
В России вынесли первое постановление о штрафе за поиск «экстремистских материалов»
What’s Next for SOC in 2026: Get the Early-Adopter Advantage
Cybersecurity is about to hit a turning point in 2026. Attackers aren’t only testing AI but also building campaigns around it. Their tooling is getting faster, more adaptive, and far better at mimicking user behavior, from reconnaissance to phishing to initial access. The Shift is Already Underway With geopolitical tension rising and technology accelerating, SOCs are entering a period where both […]
The post What’s Next for SOC in 2026: Get the Early-Adopter Advantage appeared first on Cyber Security News.