Aggregator
CVE-2026-25773 | Mattermost Focalboard up to 8.0 Category Reorder API sql injection
CVE-2026-23421 | Linux Kernel up to 6.18.16/6.19.6/7.0-rc2 configfs wa_bb_store allocation of resources
CVE-2026-23426 | Linux Kernel up to 7.0-rc1 logicvc logicvc_drm_config_parse memory leak
CVE-2026-23425 | Linux Kernel up to 6.18.16/6.19.6/7.0-rc1 KVM pkvm_init_features_from_host initialization
CVE-2026-23424 | Linux Kernel up to 6.18.16/6.19.6/7.0-rc1 amdxdna Count buffer overflow
CVE-2026-23423 | Linux Kernel up to 6.18.16/6.19.6/7.0-rc2 btrfs btrfs_uring_read_extent allocation of resources
CVE-2026-23420 | Linux Kernel up to 7.0-rc2 wifi denial of service
CVE-2026-23419 | Linux Kernel up to 6.6.129/6.12.76/6.18.16/6.19.6/7.0-rc2 rds rds_tcp_tune allocation of resources
CVE-2026-23418 | Linux Kernel up to 6.18.16/6.19.6/7.0-rc2 reg_sr xa_store allocation of resources
CVE-2026-23422 | Linux Kernel up to 7.0-rc2 dpaa2-switch out-of-bounds
Атомные часы стали чувствительнее в 100 раз — и взялись за темную материю. Охота на новую физику началась
[un]prompted 2026 – Evaluating Threats & Automating Defense At Google
Author, Creator & Presenter: Heather Adkins, VP of Security Engineering, Google & Four Flynn, VP Security and Privacy, Google
Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations') YouTube Channel.
The post [un]prompted 2026 – Evaluating Threats & Automating Defense At Google appeared first on Security Boulevard.
考古学家在北美发现距今至少 1.2 万年的骰子
Kimsuky Deploys Malicious LNK Files to Deliver Python-Based Backdoor in Multi-Stage Attack
A North Korean threat group known as Kimsuky has been caught running a cyberattack campaign that uses malicious Windows shortcut files, known as LNK files, to quietly install a Python-based backdoor on victim systems. The attack stays hidden across multiple stages, making it harder for security tools to detect before the final payload reaches the […]
The post Kimsuky Deploys Malicious LNK Files to Deliver Python-Based Backdoor in Multi-Stage Attack appeared first on Cyber Security News.
Blocking children from social media is a badly executed good idea
Governments are each inventing their own flavor of an age based ban for social media. Is the cure worse than the disease?
The post Blocking children from social media is a badly executed good idea appeared first on Security Boulevard.
Кофемашина в офисе: варит эспрессо и тихонько сливает данные за границу. Классика
Akira
You must login to view this content
Interlock
You must login to view this content
Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack
Two malicious versions of the popular JavaScript HTTP library Axios were briefly published to the npm registry on March 31, 2026. Each version carried a hidden dependency that installed a remote access trojan (RAT) across macOS, Windows, and Linux systems. The attack did not exploit a flaw in the Axios code itself. Instead, it targeted […]
The post Axios Maintainer Confirms The npm Compromise Was via a Targeted Social Engineering Attack appeared first on Cyber Security News.