Aggregator
«Уж лучше пусть следят из Китая». Американцы начали массово удалять TikTok после смены владельца
CVE-2025-27821 | Apache HDFS Native Client up to 3.4.1 URI Parser out-of-bounds write (WID-SEC-2026-0216)
CVE-2026-24656 | Apache Karaf up to 2.11.x Decanter log-socket Collector deserialization
Energy sector targeted in multi-stage phishing and BEC campaign using SharePoint
CVE-2026-23003 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 ip6_tunnel include/net/inet_ecn.h skb_vlan_inet_prepare information disclosure (EUVD-2026-4621 / Nessus ID 296526)
CVE-2026-23013 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 octep_vf_request_irqs use after free (EUVD-2026-4616 / Nessus ID 296529)
CVE-2026-23007 | Linux Kernel up to 6.18.6/6.19-rc5 block uninitialized pointer (EUVD-2026-4628 / Nessus ID 296527)
CVE-2026-23000 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 mlx5e_netdev_change_profile null pointer dereference (EUVD-2026-4618 / Nessus ID 296528)
CVE-2025-58063 | CoreDNS up to 1.12.3 plugin/etcd/etcd.go numeric conversion (GHSA-93mf-426m-g6x9 / Nessus ID 296576)
极客无疆——2025京麒白帽大会暨JSRC年终盛典圆满落幕!
Poland repels data-wiping malware attack on energy systems
Suspected Russian cyber attackers tried to take down parts of Poland’s energy infrastructure with new data-wiping malware – and failed. According to information shared by the Polish government earlier this month, the attacks happened on 29 and 30 December 2025, and targeted two combined heat and power (CHP) plants and a system enabling the management of electricity generated from wind turbines and photovoltaic farms. Attack attribution “Everything indicates that these attacks were prepared by groups … More →
The post Poland repels data-wiping malware attack on energy systems appeared first on Help Net Security.
New Malware Toolkit Sends Users to Malicious Websites While the URL Stays the Same
Browser attacks have become far more dangerous and organized than before. A new threat called Stanley, discovered in January 2026, shows just how serious the problem has become. This malware-as-a-service toolkit, priced between $2,000 and $6,000, does something particularly deceptive: it displays fake websites to users while the URL bar keeps showing the legitimate address. […]
The post New Malware Toolkit Sends Users to Malicious Websites While the URL Stays the Same appeared first on Cyber Security News.
$6000 за взлом Google Chrome. В сети нашли сервис, который гарантированно пропихивает вирусы в Chrome Web Store
Okta Flags Customized, Reactive Vishing Attacks Which Bypass MFA
CVE-2016-15057 | Apache Continuum REST API command injection
科学家识别定义“你”的脑电波
Qilin
You must login to view this content
New Fake CAPTCHA Scam Abuses Microsoft Tools to Install Amatera Stealer
CISA Adds Five Known Exploited Vulnerabilities to Catalog
CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2018-14634 Linux Kernel Integer Overflow Vulnerability
- CVE-2025-52691 SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability
- CVE-2026-21509 Microsoft Office Security Feature Bypass Vulnerability
- CVE-2026-23760 SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
- CVE-2026-24061 GNU InetUtils Argument Injection Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.