Aggregator
HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks
Security researchers have disclosed a critical vulnerability in the HTTP/2 protocol that could enable massive distributed denial-of-service (DDoS) attacks, potentially affecting millions of web servers worldwide. The flaw, dubbed “MadeYouReset” and assigned CVE-2025-8671, was publicly disclosed on August 13, 2025, by researchers who warn it could surpass the impact of the devastating “Rapid Reset” attacks […]
The post HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
XCon2025议题||LLM-Enhanced:流量安全风险检测的范式变迁
XZ-Utils后门程序仍潜伏在Docker Hub镜像中 用户数据面临潜在风险
New NFC-Driven PhantomCard Android Malware Attacking Banking Users
A sophisticated new Android malware dubbed PhantomCard has emerged from the shadows of Brazil’s cybercriminal underground, representing a significant evolution in mobile banking threats. This malicious application leverages Near Field Communication (NFC) technology to create a seamless bridge between victims’ physical banking cards and fraudsters’ devices, enabling real-time financial theft without the need for physical […]
The post New NFC-Driven PhantomCard Android Malware Attacking Banking Users appeared first on Cyber Security News.
Cyber insurance market shows early signs of maturity
The cyber insurance market is entering a new phase of evolution and showing early signs of maturity, according to recent research from Arctic Wolf. Brokers and carriers are taking on different but connected roles to help customers get policies. Brokers advise clients and arrange coverage, while carriers work behind the scenes to evaluate and manage risk. Market growth and regional adoption trends Currently, only 47% of eligible organizations have a cyber insurance policy, indicating a … More →
The post Cyber insurance market shows early signs of maturity appeared first on Help Net Security.
CVE-2025-36010 | IBM Db2 12.1.0/12.1.1/12.1.2 on Linux deadlock (WID-SEC-2025-1675)
CVE-2025-33114 | IBM DB2 12.1.0/12.1.1/12.1.2 on Linux Query data query logic injection (WID-SEC-2025-1675)
CVE-2025-36071 | IBM DB2/DB2 Connect Server up to 11.5.9/12.1.2 Query release of resource (WID-SEC-2025-1675)
CVE-2025-2533 | IBM DB2 12.1.0/12.1.1/12.1.2 on Linux Query memory allocation (Nessus ID 243286 / WID-SEC-2025-1675)
CVE-2025-24970 | netty up to 4.1.117.Final Packet denial of service (GHSA-4g8c-wm8x-jfhw / Nessus ID 216507)
CVE-2024-52894 | IBM DB2/DB2 Connect Server up to 10.5.0.11/11.1.4.7/11.5.9/12.1.2 Query stack-based overflow (Nessus ID 243291 / WID-SEC-2025-1675)
The Edge of Agency: Defending Against the Risks of Agentic AI
0,00006 секунды — и решётка готова. Китай показал абсолютную точность сборки кубитов
CVE-2022-49880 | Linux Kernel up to 6.0.7 ext4 ext4_da_release_space allocation of resources (Nessus ID 249320 / WID-SEC-2025-0922)
CVE-2022-49839 | Linux Kernel up to 5.10.156/5.15.79/6.0.9 scsi sas_phy_add null pointer dereference (Nessus ID 249320 / WID-SEC-2025-0922)
CVE-2022-49901 | Linux Kernel up to 6.0.7 null_blk.ko allocation of resources (Nessus ID 249320 / WID-SEC-2025-0922)
CVE-2022-49885 | Linux Kernel up to 5.10.153/5.15.77/6.0.7 ACPI ghes_estatus_pool_init integer overflow (EUVD-2025-12883 / Nessus ID 249320)
CVE-2022-49890 | Linux Kernel up to 6.0.7 capabilities vfs_getxattr_alloc memory leak (Nessus ID 249320)
Obot MCP Gateway: Open-source platform to securely manage the adoption of MCP servers
Obot MCP Gateway is a free, open-source gateway that enables IT organizations to securely manage and scale adoption of Model Context Protocol (MCP) servers. MCPs are becoming the standard for how AI agents interface with real-world systems. Without a control layer, organizations risk shadow infrastructure, data exposure, and fragmented adoption. “MCP servers are the connective tissue between AI and the enterprise,” said Sheng Liang, CEO of Acorn Labs. “But without proper controls, they create more … More →
The post Obot MCP Gateway: Open-source platform to securely manage the adoption of MCP servers appeared first on Help Net Security.