Aggregator
CVE-2025-21873 | Linux Kernel up to 6.6.80/6.12.17/6.13.5 bsg_transport_sg_io_fn denial of service (Nessus ID 236983 / WID-SEC-2025-0649)
CVE-2025-21876 | Linux Kernel up to 6.12.17/6.13.5 vt-d enable_drhd_fault_handling deadlock (Nessus ID 236983 / WID-SEC-2025-0649)
CVE-2025-21872 | Linux Kernel up to 5.10.234/6.6.82/6.12.17/6.13.5 mm/early_ioremap.c early_memmap iteration (Nessus ID 236983 / WID-SEC-2025-0649)
CVE-2024-43556 | Microsoft Windows up to Server 2022 23H2 Graphics use after free
IOC Feed
The Gentleman
You must login to view this content
Your Enterprise LAN Security Is a Problem—Nile Can Fix It
For decades, the Local Area Network (LAN) has been the neglected, insecure backyard of the enterprise. While we’ve poured money and talent into fortifying our data centers and cloud environments, the LAN has remained a tangled mess of implicit trust, complicated IPAM spreadsheets, and security appliances bolted on like afterthoughts. It’s the place where “plug..
The post Your Enterprise LAN Security Is a Problem—Nile Can Fix It appeared first on Security Boulevard.
Is Unsupported OpenJDK for Universities Good Enough?
Institutions wondering whether to pay Oracle must decide whether unsupported OpenJDK for universities is good enough.
The post Is Unsupported OpenJDK for Universities Good Enough? appeared first on Azul | Better Java Performance, Superior Java Support.
The post Is Unsupported OpenJDK for Universities Good Enough? appeared first on Security Boulevard.
Veeam Sets Data Graph Course Following Acquisition of Securiti AI
Veeam Software plans to expand the scope of its offerings into the realm of data security posture management (DSPM) following the closing of a $1.725 billion acquisition of Securiti AI. Securiti AI developed a DSPM platform based on a knowledge graph that makes it possible to track the relationships between various data sets and then..
The post Veeam Sets Data Graph Course Following Acquisition of Securiti AI appeared first on Security Boulevard.
Critical Flaws Found in Elementor King Addons Affect 10,000 Sites
Ex-L3Harris exec guilty of selling cyber exploits to Russian broker
CVE-2025-40097 | Linux Kernel up to 6.17.4/6.18-rc1 null pointer dereference (WID-SEC-2025-2450)
CVE-2025-40096 | Linux Kernel up to 6.1.157/6.6.113/6.12.54/6.17.4/6.18-rc1 drm_sched_job_add_dependency double free (WID-SEC-2025-2450)
CVE-2025-40094 | Linux Kernel up to 5.15.195/6.1.157/6.6.113/6.12.54/6.17.4 usb __free null pointer dereference (WID-SEC-2025-2450)
CVE-2025-40095 | Linux Kernel up to 6.1.157/6.6.113/6.12.54/6.17.4 usb __free null pointer dereference (WID-SEC-2025-2450)
CVE-2025-40093 | Linux Kernel up to 6.1.157/6.6.113/6.12.54/6.17.4 usb __free null pointer dereference (WID-SEC-2025-2450)
Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks
Cyber info sharing ‘holding steady’ despite lapse in CISA 2015, official says
RediShell RCE Vulnerability Exposes 8,500+ Redis Instances to Code Execution Attacks
The cybersecurity landscape faced a critical threat in early October 2025 with the public disclosure of RediShell, a severe use-after-free vulnerability in Redis’s Lua scripting engine. Identified as CVE-2025-49844 and dubbed “RediShell” by Wiz researchers, this flaw enables attackers to escape the Lua sandbox restrictions and achieve host-level remote code execution on vulnerable systems. The […]
The post RediShell RCE Vulnerability Exposes 8,500+ Redis Instances to Code Execution Attacks appeared first on Cyber Security News.