Aggregator
CVE-2025-40075 | Linux Kernel up to 6.17.2 tcp_metrics dst_dev_net_rcu privilege escalation
CVE-2025-1038 | Hitachi Energy TropOS 4th Gen prior 8.9.6.0 Diagnostics Tools Page os command injection
CVE-2025-12103 | Red Hat OpenShift AI privileges assignment
Clearview AI sued in Europe over alleged privacy violations
CVE-2025-40068 | Linux Kernel up to 5.15.194/6.1.155/6.6.111/6.12.52/6.17.2 ntfs3 run_unpack integer overflow
CVE-2025-40081 | Linux Kernel up to 5.15.194/6.1.155/6.6.111/6.12.52/6.17.2 perf PERF_IDX2OFF buffer overflow
CVE-2025-40078 | Linux Kernel up to 5.15.194/6.1.155/6.6.111/6.12.52/6.17.2 bpf_sock_addr privilege escalation
CVE-2025-40069 | Linux Kernel up to 6.17.2 memory leak
CVE-2025-40066 | Linux Kernel up to 6.17.2 wifi mt7996_mac_sta_add_links null pointer dereference
CVE-2025-40062 | Linux Kernel up to 6.1.155/6.6.111/6.12.52/6.17.2 crypto qm_diff_regs initialization
CVE-2025-40060 | Linux Kernel up to 5.15.194/6.1.155/6.6.111/6.12.52/6.17.2 TRBE Driver etm_setup_aux null pointer dereference
CVE-2025-40059 | Linux Kernel up to 6.12.52/6.17.2 coresight devm_kzalloc return return value
CVE-2025-40057 | Linux Kernel up to 6.12.52/6.17.2 ptp max_vclocks max privilege escalation
CVE-2025-40056 | Linux Kernel up to 6.1.155/6.6.111/6.12.52/6.17.2 vhost copy_to_iter return return value
Critical Microsoft WSUS Security Flaw is Being Actively Exploited
A critical security flaw in Microsoft's WSUS feature is being actively exploited in the wild by threat actors who could gain access into unpatched servers, remotely control networks, and use them to deliver malware or do other damage. Microsoft is urging organizations to apply a patch to their systems.
The post Critical Microsoft WSUS Security Flaw is Being Actively Exploited appeared first on Security Boulevard.
勒索软件的赎金支付比例创新低
ATT&CK v18: Detection Strategies, More Adversary Insights,
External attack surface management (EASM) buyer's guide
Cobalt transforms ad-hoc security testing into a continuous, managed program
Cobalt has undergone a large-scale expansion of its Cobalt Offensive Security Platform to transform offensive security from ad-hoc tests into a continuous, centrally managed program. The human led, AI-powered platform provides the visibility, control, and efficiency needed to secure organizations, from code to company, at scale. According to the 2025 Gartner Innovation Insight: Penetration Testing as a Service report, “by 2029, organizations adopting PTaaS will perform penetration testing up to five times more frequently than … More →
The post Cobalt transforms ad-hoc security testing into a continuous, managed program appeared first on Help Net Security.