The North Korean threat actor known as Kimsuky has been linked to a new campaign that distributes a new variant of Android malware called DocSwap via QR codes hosted on phishing sites mimicking Seoul-based logistics firm CJ Logistics (formerly CJ Korea Express).
"The threat actor leveraged QR codes and notification pop-ups to lure victims into installing and executing the malware on their mobile
A vulnerability was found in Linux Kernel up to 6.17.2. It has been classified as critical. This issue affects the function __dm_suspend of the component dm. Performing manipulation results in null pointer dereference.
This vulnerability is reported as CVE-2025-40134. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.12.54/6.17.2. This vulnerability affects the function __sk_dst_get. The manipulation leads to use after free.
This vulnerability is traded as CVE-2025-40133. Access to the local network is required for this attack to succeed. There is no exploit available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.17.2 and classified as critical. This issue affects the function ip6_xmit of the component ipv6. Executing manipulation can lead to use after free.
This vulnerability is tracked as CVE-2025-40135. The attack is only possible within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.17.2. It has been declared as critical. Affected by this vulnerability is the function ath12k_dp_mon_rx_deliver_msdu of the component wifi. Such manipulation leads to privilege escalation.
This vulnerability is documented as CVE-2025-40131. The attack requires being on the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.12.52/6.17.2. This affects the function create_sdw_dailink. Executing manipulation can lead to null pointer dereference.
The identification of this vulnerability is CVE-2025-40132. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability described as problematic has been identified in Apple visionOS, watchOS, macOS, iOS and iPadOS up to 26.0. This vulnerability affects unknown code of the component Setting Handler. Such manipulation leads to improper access controls.
This vulnerability is referenced as CVE-2025-43496. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability classified as critical has been found in Apple macOS up to 14.8.1/15.7.1. Affected is an unknown function of the component Kernel Memory Handler. This manipulation causes out-of-bounds read.
The identification of this vulnerability is CVE-2025-43474. The attack can only be executed locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple macOS up to 14.8.1/15.7.1. It has been declared as problematic. This impacts an unknown function of the component App. Executing manipulation can lead to information disclosure.
This vulnerability is registered as CVE-2025-43477. The attack needs to be launched locally. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple macOS up to 14.8.1/15.7.1. It has been rated as critical. Affected is an unknown function of the component App. The manipulation leads to use after free.
This vulnerability is documented as CVE-2025-43478. The attack needs to be performed locally. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in Apple macOS up to 14.8.1/15.7.1. The impacted element is an unknown function of the component App. This manipulation causes improper input validation.
The identification of this vulnerability is CVE-2025-43472. The attack can only be executed locally. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Apple macOS up to 14.8.1/15.7.1. Affected by this vulnerability is an unknown functionality of the component App. Executing manipulation can lead to sandbox issue.
The identification of this vulnerability is CVE-2025-43476. The attack can only be executed locally. There is no exploit available.
You should upgrade the affected component.
A vulnerability has been found in Apple macOS up to 14.8.1/15.7.1 and classified as problematic. Affected by this issue is some unknown functionality of the component App. The manipulation leads to permission issues.
This vulnerability is referenced as CVE-2025-43479. The attack can only be performed from a local environment. No exploit is available.
The affected component should be upgraded.