Aggregator
CVE-2025-48474 | freescout up to 1.8.179 authorization (GHSA-9wc4-vchw-mr3m)
CVE-2025-29632 | free5GC 4.0.0 denial of service (Issue 657)
CVE-2025-48475 | freescout up to 1.8.179 authorization (GHSA-xvch-f75c-8w8q)
CVE-2025-46570 | vLLM up to 0.8.x TTFT timing discrepancy (GHSA-4qjh-9fv9-r85r)
CVE-2024-51392 | OpenKnowledgeMaps Headstart 7 URL Parameter getPDF.php input validation
ConnectWise says nation-state attack targeted multiple ScreenConnect customers
CISO’s open letter on third-party software risk is a call to action
The accelerated adoption of software as a service (SaaS) has fundamentally changed software consumption patterns, but it has also introduced a significant concentration of risk across enterprise environments and global critical infrastructure.
The post CISO’s open letter on third-party software risk is a call to action appeared first on Security Boulevard.
Nvidia CEO Huang Warns Export Bans Empower Chinese AI Firms
CEO Jensen Huang says new U.S. chip restrictions on China forced Nvidia to write down $4.5 billion in AI inventory and will hurt American leadership in global infrastructure as Chinese firms gain momentum. The rules fuel China’s rise and jeopardize U.S. infrastructure dominance, according to Huang.
Cryptohack Roundup: $223M Cetus Exploit
This week, $223M Cetus Protocol hack, U.S. judge overturned Mango Markets hacker convictions, class action lawsuit against Coinbase, Cork Protocol's $12M exploit, fake software sites spread crypto-stealing malware, a violent crypto-linked kidnapping and civil proceedings against the ex-ACX exec.
Thousands of ASUS Routers Hit by Persistent Backdoor
Someone - possibly nation-state hackers - appears to be constructing a botnet from thousands of Asus routers in hacking that survives a firmware patch and reboots. Nearly 9,000 routers have been compromised and the number is growing, say researchers.
UK Launches 'Kill Web' Linking Cyber Operations and Military
The United Kingdom pledged Thursday one billion pounds for a military "Digital Targeting Web" the government said will enable quick fire targeting of enemy assets, including through offensive cyber operations. "Ways of warfare are rapidly changing," said Defense Secretary John Healy.
Emulating the Unyielding Scattered Spider
AttackIQ has released a new assessment template that contains a curated list of Tools and Malware samples associated with Scattered Spider to help defenders improve their security posture against this sophisticated and persistent threat.
The post Emulating the Unyielding Scattered Spider appeared first on AttackIQ.
The post Emulating the Unyielding Scattered Spider appeared first on Security Boulevard.
BSidesLV24 – PasswordsCon – We Removed Passwords, Now What?
Author/Presenter: Aldo Salas
Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel.
The post BSidesLV24 – PasswordsCon – We Removed Passwords, Now What? appeared first on Security Boulevard.
Protecting Windows Servers from Ransomware Attack Vectors
In the ever-evolving landscape of cybersecurity threats, protecting Windows servers from ransomware has become increasingly critical as these attacks continue to surge alarmingly. Ransomware attacks have increased by 435% since 2020, with organizations facing increasingly sophisticated attack methods. As these threats become complex, understanding the primary attack vectors and implementing robust protection strategies has become […]
The post Protecting Windows Servers from Ransomware Attack Vectors appeared first on Cyber Security News.
LogonBox SSPR 2.4.12 – Now Available
IntroductionLogonBox is pleased to announce the immediate availability of LogonBox SSPR 2.4.12.This release includes performance improvements for large user counts, disabled account license changes, and retries for cloud-delivered OTP messages. The changelog at the bottom lists all new features and bugs fixed.Reducing memory footprintWhen large numbers of users and groups exist, this could cause issues [...]
The post LogonBox SSPR 2.4.12 – Now Available appeared first on LogonBox.
The post LogonBox SSPR 2.4.12 – Now Available appeared first on Security Boulevard.
FunOS: когда вместо утилизации — вторая жизнь под Linux
More From Our Main Blog: Official Root Cause Analysis (RCA) for SentinelOne Global Service Interruption – May 29, 2025
UPDATE 3 (20:47 UTC, May 31, 2025): A Root Cause Analysis into the May 29, service disruption has been complet […]
The post Official Root Cause Analysis (RCA) for SentinelOne Global Service Interruption – May 29, 2025 appeared first on SentinelOne.
Threat Actors Exploit Nifty[.]com Infrastructure in Sophisticated Phishing Attack
Threat actors have orchestrated a multi-wave phishing campaign between April and May 2025, leveraging the legitimate infrastructure of Nifty[.]com, a prominent Japanese Internet Service Provider (ISP), to execute their attacks. Uncovered by Raven, a leading threat detection entity, this operation stands out due to its ability to evade conventional email security systems by abusing trusted […]
The post Threat Actors Exploit Nifty[.]com Infrastructure in Sophisticated Phishing Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.