Aggregator
CVE-2012-3062 | Cisco IOS 15.1 Multicast Listener Discovery input validation (SBV-44283)
CVE-2012-3918 | Cisco IOS up to 15.3 on Cisco 2900 TDM/HDLC denial of service
CVE-2012-4638 | Cisco IOS 15.1 Session denial of service
CVE-2012-4651 | Cisco IOS up to 15.3 ScanSafe numeric error
CVE-2012-4658 | Cisco ios up to 15.1 HTTP Service improper authentication (SBV-44278)
ИИ в каждой игре — это новая реальность. Но Sony уверяет: бояться не стоит
Lyrie.ai Joins First Batch of Anthropic’s Cyber Verification Program
Cyber Espionage Group Targets Aviation Firms to Steal Map Data
10 questions to ask when using AI models to find vulnerabilities
你继承了父亲的 RNA
GhostLock Attack Leverages Windows file-sharing to Lock Files Access Like Ransomware
Traditional ransomware disrupts organizations by encrypting data and demanding payment for decryption keys. However, a newly disclosed technique called GhostLock demonstrates a fundamentally different availability attack that achieves the same business disruption without writing a single encrypted byte to disk. Discovered by Kim Dvash, an Offensive Security Team Leader, GhostLock exploits standard Windows file-sharing behavior […]
The post GhostLock Attack Leverages Windows file-sharing to Lock Files Access Like Ransomware appeared first on Cyber Security News.
Submit #809371: OpenClaw (formally ClawdBot) openclaw 2026.1.24 Authentication Bypass Issues [Accepted]
Hackers Use Weaponized JPEG File to Deploy Trojanized ScreenConnect Malware
A sophisticated new cyberattack campaign is targeting Windows systems using a fake image file to sneak dangerous malware past security defenses. The operation, named Operation SilentCanvas, tricks victims into running a malicious PowerShell script disguised as a harmless JPEG photo, ultimately handing attackers full and silent control of the infected machine. The attack begins when […]
The post Hackers Use Weaponized JPEG File to Deploy Trojanized ScreenConnect Malware appeared first on Cyber Security News.