Aggregator
CVE-2024-30133 | HCL Traveler for Microsoft Outlook up to 3.0.10 on Microsoft control flow (KB0114725)
CVE-2023-53009 | Linux Kernel up to 6.1.8 amdkfd initialization (WID-SEC-2025-0649)
CVE-2023-53000 | Linux Kernel up to 5.4.230/5.10.165/5.15.90/6.1.8 netlink __nla_validate_parse array index (Nessus ID 241018 / WID-SEC-2025-0649)
CVE-2023-53004 | Linux Kernel up to 6.1.8 ovl memory leak (WID-SEC-2025-0649)
CVE-2023-53007 | Linux Kernel up to 6.1.8 trace_printk denial of service (Nessus ID 238183 / WID-SEC-2025-0649)
CVE-2023-53006 | Linux Kernel up to 4.19.271/5.4.230/5.10.165/5.15.90/6.1.8 smbd_destroy use after free (Nessus ID 241018 / WID-SEC-2025-0649)
CVE-2023-52997 | Linux Kernel up to 4.19.271/5.4.230/5.10.165/5.15.90/6.1.8 Kernel Memory ip_metrics_convert array index (Nessus ID 234545 / WID-SEC-2025-0649)
CVE-2023-53010 | Linux Kernel up to 6.1.8 snprintf buffer overflow (Nessus ID 234545 / WID-SEC-2025-0649)
New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials
Researchers have uncovered a sophisticated campaign leveraging the Lampion banking trojan, a malware strain that has operated since 2019 with a renewed focus on Portuguese financial institutions. The threat actor group behind these operations has refined its tactics significantly, introducing novel social engineering techniques that make traditional detection increasingly difficult. What distinguishes this latest iteration […]
The post New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials appeared first on Cyber Security News.
Denmark reportedly withdraws Chat Control proposal following controversy
10 самых мощных пуль в мире, которые изменили современный бой
Spyware-Plugged ChatGPT, DALL·E and WhatsApp Apps Target US Users
Diplomatic entities in Belgium and Hungary hacked in China-linked spy campaign
Brush exploit can cause any Chromium browser to collapse in 15-60 seconds
Qilin
You must login to view this content
WhatsApp adds passwordless chat backups on iOS and Android
Qilin
You must login to view this content
Qilin
You must login to view this content
New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins
A newly discovered Windows malware family named Airstalk has emerged as a sophisticated threat capable of exfiltrating sensitive browser credentials through an innovative covert command-and-control channel. Available in PowerShell and .NET variants, this malware demonstrates advanced capabilities including multi-threaded communications, versioning, and the misuse of legitimate mobile device management infrastructure. The malware hijacks the AirWatch […]
The post New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins appeared first on Cyber Security News.