Aggregator
CVE-2022-42813 | Apple iOS/iPadOS CFNetwork certificate validation (HT213489)
CVE-2022-42811 | Apple iOS/iPadOS Sandbox access control (HT213489)
CVE-2022-42813 | Apple watchOS up to 9.0.2 CFNetwork certificate validation (HT213491)
CVE-2022-42811 | Apple watchOS up to 9.0.2 Sandbox access control (HT213491)
CVE-2022-42813 | Apple tvOS up to 16.0 CFNetwork certificate validation (HT213492)
CVE-2022-42811 | Apple tvOS up to 16.0 Sandbox access control (HT213492)
CVE-2022-42813 | Apple macOS CFNetwork certificate validation (HT213488)
CVE-2022-42814 | Apple macOS Directory Utility information disclosure (HT213488)
CVE-2022-42811 | Apple macOS Sandbox access control (HT213488)
CVE-2022-42810 | Apple macOS USD File memory corruption
Alleged Sale of Unauthorized Corporate Access to an Unidentified Korean Company
City of Abilene Goes Offline in Wake of Cyberattack
3 More Healthcare Orgs Hit by Ransomware Attacks
CVE-2004-2021 | osCommerce 2.1/2.2 Cvs/2.2 Ms1/2.2 Ms2/2.2 Ms3 file_manager.php filename path traversal (EDB-24126 / Nessus ID 17595)
Malicious npm Packages Attacking Linux Developers to Install SSH Backdoors
A concerning new supply chain attack has emerged targeting Linux developers who work with Telegram’s bot ecosystem. Discovered in early 2025, several malicious npm packages have been masquerading as legitimate Telegram bot libraries to deliver SSH backdoors and exfiltrate sensitive data from unsuspecting developers. These typosquatted packages collectively accumulated approximately 300 downloads over several months, […]
The post Malicious npm Packages Attacking Linux Developers to Install SSH Backdoors appeared first on Cyber Security News.
Al-Qassam Brigades Cyber Targeted the Website of Awnings and Shading Products
The Evolution of Vulnerability Management with Steve Carter
Steve Carter discusses the evolution of the vulnerability management market, as well as where vulnerability management has failed and why the next phase has to center around automation and scale. The problem, as Carter sees it, is deceptively simple: Organizations are drowning in vulnerabilities but still can’t prioritize or fix them quickly. Scanners can identify..
The post The Evolution of Vulnerability Management with Steve Carter appeared first on Security Boulevard.
MCP Market Map
Actionable Protection Strategies for 2025 with Shrav Mehta
Shrav Mehta explores lessons from 2024’s costliest data breaches and provides actionable protection strategies for 2025. Shrav and Alan analyze the current cybersecurity landscape and discuss how businesses can strengthen their defenses. Compliance has always been a pain point for engineering teams—tedious, expensive, and often disconnected from real-time security practices. Shrav discusses the shift away..
The post Actionable Protection Strategies for 2025 with Shrav Mehta appeared first on Security Boulevard.