Aggregator
CVE-2025-45583 | Audi UTR Universal Traffic Recorder 2.0 FTP Protocol access control (EUVD-2025-29083)
CVE-2024-45433 | OpenSynergy BlueSDK up to 6.x control flow
CVE-2024-45432 | OpenSynergy BlueSDK up to 6.x Function Call access control
CVE-2025-43795 | Liferay Portal/DXP redirect (EUVD-2025-29075)
CVE-2024-45431 | OpenSynergy BlueSDK up to 6.x input validation
CVE-2025-43796 | Liferay Portal/DXP GraphQL Query resource consumption (EUVD-2025-29072)
CVE-2025-4235 | Palo Alto User-ID Credential Agent up to 11.0.2-132 on Windows Legacy Feature exposure of sensitive system information to an unauthorized control sphere (EUVD-2025-29071)
CVE-2024-45434 | OpenSynergy BlueSDK up to 6.x use after free
CVE-2025-39795 | Linux Kernel up to 6.16.1 block blk_stack_limits buffer overflow (Nessus ID 264709)
CVE-2025-39794 | Linux Kernel up to 6.16.1 ARM denial of service (Nessus ID 264712)
CVE-2025-4234 | Palo Alto Cortex XDR Microsoft 365 Defender Pack up to 11.0.2-132 Application Log log file (EUVD-2025-29070 / WID-SEC-2025-2035)
CVE-2025-42922
CVE-2025-39799 | Linux Kernel up to 6.17-rc1 ACPI denial of service
CVE-2025-39796 | Linux Kernel up to 6.15.10/6.16.1/6.17-rc1 net xsk_notify race condition
CVE-2025-39798 | Linux Kernel up to 6.16.1 NFS privilege escalation (Nessus ID 264707)
CVE-2025-39792 | Linux Kernel up to 6.12.42/6.15.10/6.16.1 dm_accept_partial_bio deadlock
CVE-2025-39797 | Linux Kernel up to 6.6.102/6.12.42/6.15.10/6.16.1 xfrm_alloc_spi iteration (Nessus ID 264708)
CVE-2025-39793 | Linux Kernel up to 6.15.10/6.16.1 io_uring allocation of resources
A Cyberattack Victim Notification Framework
Interesting analysis:
When cyber incidents occur, victims should be notified in a timely manner so they have the opportunity to assess and remediate any harm. However, providing notifications has proven a challenge across industry.
When making notifications, companies often do not know the true identity of victims and may only have a single email address through which to provide the notification. Victims often do not trust these notifications, as cyber criminals often use the pretext of an account compromise as a phishing lure.
[…]
This report explores the challenges associated with developing the native-notification concept and lays out a roadmap for overcoming them. It also examines other opportunities for more narrow changes that could both increase the likelihood that victims will both receive and trust notifications and be able to access support resources...
The post A Cyberattack Victim Notification Framework appeared first on Security Boulevard.