Aggregator
Меньше кнопок — больше свободы: сила qutebrowser против Chrome
CVE-2022-29915 | Mozilla Firefox up to 99 Performance API cross-domain policy (Bug 1751678)
CVE-2022-31736 | Mozilla Firefox up to 100 cross-domain policy (Bug 1735923)
CVE-2022-31736 | Mozilla Thunderbird up to 91.9 cross-domain policy (Bug 1735923)
CVE-2022-36319 | Mozilla Firefox up to 102 CSS access control (Bug 1737722)
CVE-2022-36317 | Mozilla Firefox up to 102 on Android URL denial of service (Bug 1759951)
CVE-2022-36318 | Mozilla Firefox up to 102 chrome URL cross site scripting (Bug 1771774)
CVE-2022-36320 | Mozilla Firefox up to 102 memory corruption
CVE-2022-36319 | Mozilla Thunderbird up to 102 CSS access control (Bug 1737722)
CVE-2022-36318 | Mozilla Thunderbird up to 102 chrome URL cross site scripting (Bug 1771774)
CVE-2022-2505 | Mozilla Thunderbird up to 102 memory corruption
CVE-2022-38472 | Mozilla Firefox up to 103 XSLT Error clickjacking (Bug 1769155)
CVE-2022-38472 | Mozilla Thunderbird up to 102.1 XSLT Error clickjacking (Bug 1769155)
CVE-2022-43271 | Inhabit Move CRM 4 Build 260 User Profile cross site scripting
ICICI Bank Ransomware Breach: A Stark Reminder of Supply Chain Risk and the Need for Real-Time Cyber Vigilance
The recent ransomware breach tied to ICICI Bank—claimed by the LockBit group—has raised fresh concerns about the fragility of digital ecosystems and third-party risk. While official confirmations remain limited, leaked files and dark web chatter suggest that attackers accessed systems through a vendor relationship and exfiltrated over 3 TB of sensitive data, including customer records
The post ICICI Bank Ransomware Breach: A Stark Reminder of Supply Chain Risk and the Need for Real-Time Cyber Vigilance appeared first on Seceon Inc.
The post ICICI Bank Ransomware Breach: A Stark Reminder of Supply Chain Risk and the Need for Real-Time Cyber Vigilance appeared first on Security Boulevard.
The TraderTraitor Crypto Heist: Nation-State Tactics Meet Financial Cybercrime
The cryptocurrency sector has always been a magnet for cybercriminals, but the TraderTraitor campaign marks a different kind of threat—one backed by state-sponsored actors with long-term goals and surgical precision. Allegedly linked to North Korea’s Lazarus Group, this campaign wasn’t just about breaking into wallets. It was about exploiting trust, manipulating human behavior, and moving
The post The TraderTraitor Crypto Heist: Nation-State Tactics Meet Financial Cybercrime appeared first on Seceon Inc.
The post The TraderTraitor Crypto Heist: Nation-State Tactics Meet Financial Cybercrime appeared first on Security Boulevard.
Apache security advisory (AV25-213)
How and Why Threat Hunting Teams Investigate Linux Malware Attacks
Linux cyber threats are less widespread than Windows ones yet it can make them even more dangerous. Underestimated and under-anticipated, they stab endpoints and networks in the back, bringing operational disruption and financial loss. It’s true that individual desktop users are less targeted by Linux-specific malware, than that tailored for Windows systems. Although they still […]
The post How and Why Threat Hunting Teams Investigate Linux Malware Attacks appeared first on Cyber Security News.