Aggregator
Years-Old Vulnerable Apache Struts 2 Versions See 387K Weekly Downloads
Никакой почты, IP-адресов и доступа для спецслужб. Создатель Signal запустил Confer – «самый приватный» ИИ-ассистент
Microsoft and Authorities Dismatles BEC Attack Chain Powered by RedVDS Fraud Engine
A joint operation led by Microsoft and international law enforcement has dismantled a business email compromise (BEC) attack chain powered by the RedVDS fraud engine. RedVDS operated as a low‑cost “cybercrime subscription” platform, giving criminals disposable virtual machines that looked like normal Windows systems on the internet. Using these rented hosts, threat actors sent huge […]
The post Microsoft and Authorities Dismatles BEC Attack Chain Powered by RedVDS Fraud Engine appeared first on Cyber Security News.
Critical Cal.com Vulnerability Let Attackers Bypass Authentication and Hijack any User Account
A critical authentication bypass vulnerability in Cal.com’s scheduling platform enables attackers to hijack any user account by exploiting a flaw in the NextAuth JWT callback mechanism. Tracked as CVE-2026-23478, this vulnerability affects versions from 3.1.6 up to but not including 6.0.7, with patches available in version 6.0.7 and later. The vulnerability resides in a custom […]
The post Critical Cal.com Vulnerability Let Attackers Bypass Authentication and Hijack any User Account appeared first on Cyber Security News.
Palo Alto Networks addressed a GlobalProtect flaw, PoC exists
ICE Agent Doxxing Site DDoS-ed Via Russian Servers
Firefox 147 Released With Fixes for 16 Vulnerabilities that Enable Arbitrary Code Execution
Mozilla released Firefox 147 on January 13, 2026, addressing 16 security vulnerabilities detailed in the Mozilla Foundation Security Advisory. The update patches critical issues across components such as graphics, JavaScript, and networking, addressing six high-impact flaws, including multiple sandbox escapes, that could enable arbitrary code execution if exploited. These fixes also apply to Firefox ESR […]
The post Firefox 147 Released With Fixes for 16 Vulnerabilities that Enable Arbitrary Code Execution appeared first on Cyber Security News.
Заработать на ракету через Upwork. История о том, как северокорейские айтишники захватывают мировой фриланс
【安全圈】伪装慈善网站钓鱼!乌克兰国防军遭遇 PLUGGYAPE 网络攻击
【安全圈】Apache Struts 2曝高危漏洞:攻击者可窃取敏感数据
【安全圈】微软Copilot曝一键式漏洞:攻击者可悄无声息窃取敏感数据
【安全圈】株洲查处一起非法架设GOIP设备案件,2人被抓
Trio of Critical Bugs Spotted in Delta Industrial PLCs
4 Outdated Habits Destroying Your SOC's MTTR in 2026
网红与 OnlyFans 模特主导美国特殊人才 O-1 签证
Critical WordPress Plugin Vulnerability Exploited in the Wild to Gain Instant Admin Access
A critical unauthenticated privilege escalation vulnerability in the Modular DS WordPress plugin allows attackers to gain instant admin access, with exploitation confirmed in the wild. Affecting over 40,000 sites, the flaw in versions up to 2.5.1 has prompted urgent patches and mitigations from Patchstack and the vendor. Modular DS, developed by modulards.com, enables remote management […]
The post Critical WordPress Plugin Vulnerability Exploited in the Wild to Gain Instant Admin Access appeared first on Cyber Security News.
Нет интернета — нет фальсификаций (по крайней мере, так думают в Уганде)
AWS European Sovereign Cloud puts data, operations, and oversight inside the EU
Amazon has made the AWS European Sovereign Cloud generally available to customers across the European Union, backed by a €7.8 billion investment. According to AWS, the funding will support infrastructure buildout, staffing, and long-term operations, and is expected to drive regional economic activity and job creation over the coming years. A separate cloud built for EU requirements The AWS European Sovereign Cloud operates as a distinct cloud environment. Infrastructure, services, and operations are located entirely … More →
The post AWS European Sovereign Cloud puts data, operations, and oversight inside the EU appeared first on Help Net Security.