Aggregator
CVE-2023-40456 | Apple tvOS App access control
CVE-2023-40520 | Apple iOS/iPadOS access control
CVE-2023-40520 | Apple watchOS access control
CVE-2023-40455 | Apple macOS 13 permission
CVE-2025-20304 | Cisco Identity Services Engine Software up to 3.4.0 Web-based Management Interface cross site scripting (cisco-sa-ise-multiple-vulns-O9BESWJH / EUVD-2025-37882)
CVE-2025-43493
CVE-2025-43503
Iranian Hackers Targeting Academics and Foreign Policy Experts Using RMM Tools
A previously unidentified Iranian threat actor has emerged with sophisticated social engineering tactics aimed at academics and foreign policy experts across the United States. Operating between June and August 2025, this campaign demonstrates the evolving landscape of state-sponsored cyber espionage, where attackers blend traditional phishing techniques with legitimate remote management tools to compromise high-value targets. […]
The post Iranian Hackers Targeting Academics and Foreign Policy Experts Using RMM Tools appeared first on Cyber Security News.
How a ransomware gang encrypted Nevada government's systems
Cisco became aware of a new attack variant against Secure Firewall ASA and FTD devices
AquaWomb — первая в мире коммерческая искусственная матка. Двойной мешок имитирует стенки, катетеры заменяют лёгкие
Cisco security advisory (AV25-619) – Update 1
INC
You must login to view this content
Qilin
You must login to view this content
Qilin
You must login to view this content
Qilin
You must login to view this content
Qilin
You must login to view this content
Просто гуглил. 20-летнего жителя Урала первым в России судят за умышленный поиск запрещенного контента
Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server
North Korean threat actors are evolving their attack strategies by leveraging developer-focused tools as infection vectors. Recent security discoveries reveal that Kimsuky, a nation-state group operating since 2012, has been utilizing JavaScript-based malware to infiltrate systems and establish persistent command and control infrastructure. The threat group traditionally focuses on espionage operations against government entities, think […]
The post Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server appeared first on Cyber Security News.