Aggregator
CVE-2025-26595 | Red Hat Enterprise Linux 6/7/8/9 X.org X11 Server/TigerVNC XkbVModMaskText stack-based overflow
CVE-2025-26601 | Red Hat Enterprise Linux 6/7/8/9 X.org X11 Server/TigerVNC SyncInitTrigger use after free
CVE-2025-26594 | Red Hat Enterprise Linux 6/7/8/9 X.org X11 Server/TigerVNC use after free
Фиаско Нулевого дня: как сериал о важном провалился под тяжестью политических клише
CVE-2025-23024 | GLPI up to 10.0.17 install/update.php improper authorization (GHSA-885x-hvp2-85q8)
Avalon Hotel: Beverly Hills, Palm Springs Has Fallen Victim to RansomHub Ransomware
CVE-2025-1586 | code-projects Blood Bank System 1.0 /Blood/A-.php Bloodname cross site scripting
Азиатские хакеры зашли через СКУД: 1,5 года скрытого шпионажа в России
What Is Cybersecurity Performance Management? | Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience.
The post What Is Cybersecurity Performance Management? | Kovrr appeared first on Security Boulevard.
A Threat Actor Claims to be Selling a Crypto Payment Gateway
APT73
North Korean Hackers Steal $1.5B in Cryptocurrency
It looks like a very sophisticated attack against the Dubai-based exchange Bybit:
Bybit officials disclosed the theft of more than 400,000 ethereum and staked ethereum coins just hours after it occurred. The notification said the digital loot had been stored in a “Multisig Cold Wallet” when, somehow, it was transferred to one of the exchange’s hot wallets. From there, the cryptocurrency was transferred out of Bybit altogether and into wallets controlled by the unknown attackers.
[…]
…a subsequent investigation by Safe found no signs of unauthorized access to its infrastructure, no compromises of other Safe wallets, and no obvious vulnerabilities in the Safe codebase. As investigators continued to dig in, they finally settled on the true cause. Bybit ultimately said that the fraudulent transaction was “manipulated by a sophisticated attack that altered the smart contract logic and masked the signing interface, enabling the attacker to gain control of the ETH Cold Wallet.”...
The post North Korean Hackers Steal $1.5B in Cryptocurrency appeared first on Security Boulevard.
Behind the Baseline: Reflecting on the launch of the Open Source Project Security Baseline
It's been a while since I've shared an update on the work Sonatype is doing in the open source ecosystem, so I'm excited to share an update on a few things we're doing in the space — and how it led to the creation of a new security standard in the Open Source Security Foundation (OpenSSF).
The post Behind the Baseline: Reflecting on the launch of the Open Source Project Security Baseline appeared first on Security Boulevard.
UAC-0212 Hackers Launching Destructive Attack Targeting Critical Infrastructure
A sophisticated threat cluster tracked as UAC-0212 has escalated efforts to compromise critical infrastructure systems in Ukraine, according to a recent advisory from CERT-UA (Government Computer Emergency Response Team of Ukraine). These attacks, active since July 2024, focus on energy, water supply, grain logistics, and transportation sectors through coordinated supply-chain compromises. The group employs destructive […]
The post UAC-0212 Hackers Launching Destructive Attack Targeting Critical Infrastructure appeared first on Cyber Security News.
Шаг к реальному анабиозу: нейроны ожили после недели заморозки
News alert: INE secures spot in G2’s 2025 Top 50 education software rankings
Cary, NC, Feb. 25, 2025, CyberNewswire — INE, the leading provider of networking and cybersecurity training and certifications, today announced its recognition as an enterprise and small business leader in online course providers and cybersecurity professional development, along with … (more…)
The post News alert: INE secures spot in G2’s 2025 Top 50 education software rankings first appeared on The Last Watchdog.
The post News alert: INE secures spot in G2’s 2025 Top 50 education software rankings appeared first on Security Boulevard.
US drug testing firm DISA says data breach impacts 3.3 million people
FatalRAT: новый троян поражает энергетику, здравоохранение и логистику
GhostGPT: An Uncensored AI Chatbot Empowering Cybercriminals
GhostGPT is revolutionizing cybercrime by providing hackers with an AI tool that bypasses ethical guardrails found in mainstream models. Available as little as $150, it enables even novice attackers to generate malicious code, craft phishing emails, and automate social engineering at scale.
The post GhostGPT: An Uncensored AI Chatbot Empowering Cybercriminals appeared first on Security Boulevard.