Aggregator
CVE-2022-39320 | FreeRDP up to 2.8.x out-of-bounds (GHSA-qfq2-82qr-7f4j / Nessus ID 211437)
CVE-2022-39347 | FreeRDP up to 2.8.x Drive Channel path traversal (GHSA-c5xq-8v35-pffg / Nessus ID 211437)
CVE-2022-41877 | FreeRDP up to 2.8.x Drive Channel memory corruption (GHSA-pmv3-wpw4-pw5h / Nessus ID 211437)
CVE-2022-36227 | libarchive 3.6.1 calloc null pointer dereference (Issue 1754 / Nessus ID 209121)
18 arrested in €300 million global credit card fraud scheme
A coordinated international operation has led to 18 arrests in a massive credit card fraud case worth at least €300 million. The effort, led by Eurojust, targeted a network of suspects accused of running fake online subscription services for dating, pornography, and streaming sites. Among those detained were five executives from four German payment service providers. Authorities said the fraud affected several million credit card users across 193 countries and involved 19 million accounts. Investigators … More →
The post 18 arrested in €300 million global credit card fraud scheme appeared first on Help Net Security.
How an Attacker Drained $128M from Balancer Through Rounding Error Exploitation
By: Dikla Barda, Roaman Zaikin & Oded Vanunu On November 3, 2025, Check Point Research’s blockchain monitoring systems detected a sophisticated exploit targeting Balancer V2’s ComposableStablePool contracts. The attacker exploited arithmetic precision loss in pool invariant calculations to drain $128.64 million across six blockchain networks in under 30 minutes. The attack leveraged a rounding error […]
The post How an Attacker Drained $128M from Balancer Through Rounding Error Exploitation appeared first on Check Point Research.
Scientists Need a Positive Vision for AI
For many in the research community, it’s gotten harder to be optimistic about the impacts of artificial intelligence.
As authoritarianism is rising around the world, AI-generated “slop” is overwhelming legitimate media, while AI-generated deepfakes are spreading misinformation and parroting extremist messages. AI is making warfare more precise and deadly amidst intransigent conflicts. AI companies are exploiting people in the global South who work as data labelers, and profiting from content creators worldwide by using their work without license or compensation. The industry is also affecting an already-roiling climate with its ...
The post Scientists Need a Positive Vision for AI appeared first on Security Boulevard.
Даже Эйнштейн мог ошибаться: тёмная энергия больше не константа. А значит, Вселенная не погибнет... её ждёт Большая заморозка
Qilin
You must login to view this content
CVE-2024-35999 | Linux Kernel up to 6.1.90/6.6.29/6.8.8 smb3 race condition (Nessus ID 272287)
CVE-2025-6205 | Dassault Systèmes DELMIA Apriso up to 2025 authorization (EUVD-2025-23493 / Nessus ID 272294)
How the F5 breach, CISA job cuts, and a government shutdown are eroding U.S. cyber readiness
By furloughing employees, halting procurement, and delaying guidance, agencies are operating with skeleton crews and depleted morale. For nation-state operators, this expanding attack surface and declining oversight are creating a huge window of opportunity.
The post How the F5 breach, CISA job cuts, and a government shutdown are eroding U.S. cyber readiness appeared first on CyberScoop.
Securing the Open Android Ecosystem with Samsung Knox
NGate Malware Enables Unauthorized Cash Withdrawals at ATMs Using Victims’ Payment Cards
NGate represents a sophisticated Android-based threat that exploits NFC technology to enable unauthorized ATM cash withdrawals without physically stealing payment cards. Rather than stealing cards outright, threat actors use an ingenious relay attack that intercepts the card’s NFC communications from a victim’s Android phone and transmits them to an attacker-controlled device positioned at an ATM, […]
The post NGate Malware Enables Unauthorized Cash Withdrawals at ATMs Using Victims’ Payment Cards appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Targeting Freight Operators to Steal Cargo: Proofpoint
Threat actors are working with organized crime groups to target freight operators and transportation companies, infiltrate their systems through RMM software, and steal cargo, which they then sell online or ship to Europe, according to Proofpoint researchers, who saw similar campaigns last year.
The post Hackers Targeting Freight Operators to Steal Cargo: Proofpoint appeared first on Security Boulevard.
CISA Warns of Control Web Panel OS Command Injection Vulnerability Exploited in Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding a dangerous OS command injection vulnerability affecting Control Web Panel (CWP), formerly known as CentOS Web Panel. The vulnerability, tracked as CVE-2025-48703, enables unauthenticated remote attackers to execute arbitrary commands on vulnerable systems with minimal prerequisites. CVE-2025-48703 represents a significant security risk […]
The post CISA Warns of Control Web Panel OS Command Injection Vulnerability Exploited in Attacks appeared first on Cyber Security News.