Aggregator
CVE-2023-20599 | AMD EPYC 7002 Processors Crypto Co-Processor improper access control for register interface
CVE-2025-24068 | Microsoft Windows up to Server 2025 Storage Management Provider buffer over-read
CVE-2025-47108 | Adobe Substance3D Painter up to 11.0.1 out-of-bounds write (apsb25-58)
CVE-2025-24065 | Microsoft Windows up to Server 2025 Storage Management Provider out-of-bounds
CVE-2025-24471 | Fortinet FortiOS up to 7.4.7/7.6.1 certificate validation (FG-IR-24-544)
CVE-2025-22256 | Fortinet FortiPAM/FortiSRA up to 1.4.1 HTTP Request insufficient permissions or privileges (FG-IR-25-008)
CVE-2024-54019 | Fortinet FortiClientWindows up to 7.0.14/7.2.6/7.4.0 VPN Connection certificate validation (FG-IR-24-365)
CVE-2024-45329 | Fortinet FortiPortal up to 7.0.8/7.2.5/7.4.0 authorization (FG-IR-24-274)
Randall Munroe’s XKCD ‘Trojan Horse’
via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Trojan Horse’ appeared first on Security Boulevard.
CVE-2011-3175 | Novell ZENworks Configuration Management up to 11.2 Preboot Service 0x21 Opcode memory corruption (EDB-19958 / Nessus ID 58968)
CVE-2025-32454 | Siemens Teamcenter Visualization WRL File Parser out-of-bounds (ssa-542540 / EUVD-2025-14708)
CVE-2025-30280 | Siemens Mendix Runtime 10.16.0 observable response discrepancy (ssa-874353 / EUVD-2025-10338)
CVE-2024-46887 | Siemens SIMATIC Drive Controller CPU 1504D TF Web Server RuntimeInfoData.mwsl authentication bypass (ssa-054046 / EUVD-2024-42134)
CVE-2025-43699 | Salesforce OmniStudio 254/up to 253/up to Spring 2025 FlexCards permissions (EUVD-2025-17663)
CVE-2025-37100 | HPE Aruba Networking Private 5G Core up to 1.25.1.0 API information disclosure (EUVD-2025-17676)
CVE-2025-40585 | Siemens Energy Services G5DFR default permission (ssa-345750 / EUVD-2025-17678)
CVE-2025-44044 | Keyoti SearchUnit up to 8.x File Parser xml external entity reference (EUVD-2025-17677)
CVE-2025-40569 | Siemens SCALANCE XRM334 up to 3.1 Web Interface race condition (ssa-693776 / EUVD-2025-17679)
North Korean APT Hackers Target Users on Social Media to Spread Malware
The Genians Security Center (GSC) has uncovered a highly sophisticated Advanced Persistent Threat (APT) campaign orchestrated by the North Korean state-sponsored hacking group Kimsuky. Active between March and April 2025, this campaign, identified as part of the notorious ‘AppleSeed’ operation, targets individuals in South Korea through a multi-pronged approach using Facebook, email, and Telegram. Sophisticated […]
The post North Korean APT Hackers Target Users on Social Media to Spread Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.