Aggregator
CVE-2025-31239 | Apple visionOS File Parser use after free (EUVD-2025-14774)
CVE-2025-31239 | Apple watchOS File Parser use after free (EUVD-2025-14774)
CVE-2025-31239 | Apple tvOS File Parser use after free (EUVD-2025-14774)
CVE-2025-31239 | Apple macOS File Parser use after free (EUVD-2025-14774)
CVE-2025-31239 | Apple iOS/iPadOS File Parser use after free (EUVD-2025-14774)
China-linked Murky Panda targets and moves laterally through cloud services
In its recently released 2025 Threat Hunting Report, Crowdstrike pointed out an interesting trend: a 136% surge in cloud intrusions. A good chunk of this surge is due to “China-nexus adversaries”, Murky Panda (aka Silk Typhoon) among them. Murky Panda’s modus operandi The group has been active since at least 2023, and is primarily focused on breaching government, technology, academia, legal, and professional services entities in North America and stealing sensitive information from them. The … More →
The post China-linked Murky Panda targets and moves laterally through cloud services appeared first on Help Net Security.
Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
BQTLOCK Ransomware-as-a-Service Emerges, Boasting Sophisticated Evasion Tactics
Ransomware-as-a-Service (RaaS) models continue to democratize sophisticated attacks in the ever-changing world of cybercrime by allowing affiliates with little technical know-how to distribute ransomware through profit-sharing or subscription models. A newly identified strain, BQTLock, has emerged since mid-July 2025, operating under this RaaS paradigm and marketed aggressively on dark web forums and Telegram channels. Overview […]
The post BQTLOCK Ransomware-as-a-Service Emerges, Boasting Sophisticated Evasion Tactics appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-43214 | Apple watchOS Web memory corruption (EUVD-2025-23127)
CVE-2025-43214 | Apple iOS/iPadOS Web memory corruption (EUVD-2025-23127)
CVE-2025-43214 | Apple tvOS Web memory corruption (EUVD-2025-23127)
CVE-2025-43214 | Apple visionOS Web memory corruption (EUVD-2025-23127)
CVE-2025-43214 | Apple macOS Web memory corruption (EUVD-2025-23127)
CVE-2025-9341 | Bouncy Castle for Java FIPS up to 2.1.0 API Module AESNativeCBC.Java resource consumption (EUVD-2025-25504 / WID-SEC-2025-1895)
CVE-2025-9340 | Bouncy Castle for Java up to 2.1.0 API Module BaseCipher out-of-bounds write (EUVD-2025-25505 / WID-SEC-2025-1895)
Automated Vulnerability Management: What It Is & Why You Need It
Organizations nowadays are struggling with a growing IT environment, cloud-based workloads, APIs, IoT devices, and containerized applications are just a few of the ingredients thrown into the mix. With every...
The post Automated Vulnerability Management: What It Is & Why You Need It appeared first on Strobes Security.
The post Automated Vulnerability Management: What It Is & Why You Need It appeared first on Security Boulevard.