Aggregator
Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments
A sophisticated spear-phishing campaign orchestrated by Iranian-aligned operators has been identified targeting diplomatic missions worldwide through a compromised Ministry of Foreign Affairs of Oman mailbox. The attack, discovered in August 2025, represents a continuation of tactics associated with the Homeland Justice group connected to Iran’s Ministry of Intelligence and Security (MOIS). The campaign leveraged social […]
The post Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments appeared first on Cyber Security News.
CVE-2025-32100 | Samsung Mobile Processor Exynos up to 9110 ROHC Packet out-of-bounds write (EUVD-2025-26420)
CVE-2025-57778 | Digilent DASYLab DSB File Parser improper validation of specified index, position, or offset in input
CVE-2025-32098 | Samsung Magician up to 8.3 on Windows Update privilege escalation (EUVD-2025-26421)
CVE-2024-51423 | Infor Global HR GHR up to 11.23.03.00.21 Class cross site scripting
CVE-2025-55372 | Beakon Application up to 5.4.2 unrestricted upload
CVE-2024-48705 | Wavlink AC1200 M32A3_V1410_230602/M32A3_V1410_240222 adm.cgi set_sys_adm newpass command injection
CVE-2025-50757 | Wavlink WN535K3 20191010 set_sys_adm Username command injection
CVE-2025-50755 | Wavlink WN535K3 20191010 set_sys_cmd command command injection
CVE-2025-54599 | Bevy Event Service up to 2025-07-22 privilege escalation
CVE-2025-57616 | rust-ffmpeg up to 0.3.0 Data Structure write_interleaved use after free (Issue 192)
CVE-2025-57615 | rust-ffmpeg 0.3.0 sws_allocVec usize null pointer dereference (Issue 192)
CVE-2025-57614 | rust-ffmpeg 0.3.0 Dimension Parameter denial of service (Issue 192)
CVE-2025-57613 | rust-ffmpeg 0.3.0 avio_alloc_context null pointer dereference (Issue 192)
CVE-2025-57612 | rust-ffmpeg 0.3.0 av_get_sample_fmt_name null pointer dereference (Issue 192)
CVE-2025-57611 | rust-ffmpeg 0.3.0 avfilter_graph_dump null pointer dereference (Issue 192)
INC
You must login to view this content
Stop Panicking: The FIDO ‘Bypass’ That Never Actually Bypassed FIDO
The cybersecurity world exploded in August 2025 when SquareX dropped a bombshell at Black Hat USA: passkeys were “pwned.” Headlines screamed. Twitter erupted. CTOs panicked. But here’s what actually happened: absolutely nothing changed about FIDO’s security. The Anatomy of a Media Meltdown SquareX’s presentation, “Passkeys Pwned: Turning WebAuthn Against Itself,” sent shockwaves through enterprise security..
The post Stop Panicking: The FIDO ‘Bypass’ That Never Actually Bypassed FIDO appeared first on Security Boulevard.