Aggregator
CVE-2025-0510 | Mozilla Thunderbird up to 128.6/134.x From ui layer
CVE-2025-1017 | Mozilla Thunderbird up to 128.6/134.x memory corruption
CVE-2025-1017 | Mozilla Firefox up to 128.6/134.x memory corruption
7-Zip MotW bypass exploited in zero-day attacks against Ukraine
Cycode Change Impact Analysis boosts application security posture
Cycode unveiled Change Impact Analysis (CIA) technology, a key addition to its Complete ASPM platform. This solution empowers organizations to proactively assess the security impact of every code change, enabling them to identify, prioritize, and remediate vulnerabilities faster and more efficiently. By understanding how code changes affect risk and compliance, development teams can accelerate secure innovation without compromising security. This announcement comes on the heels of significant momentum for Cycode, including securing three of the … More →
The post Cycode Change Impact Analysis boosts application security posture appeared first on Help Net Security.
CVE-2025-1016 | Mozilla Thunderbird up to 128.6/134.x memory corruption (Nessus ID 214965)
CVE-2025-1016 | Mozilla Firefox up to 128.6/134.x memory corruption (Nessus ID 214965)
CVE-2025-0825 | yhirose cpp-httplib up to 0.18.3 HTTP Response response splitting
CVE-2025-1013 | Mozilla Thunderbird up to 128.6/134.x Private Browsing Mode race condition
CVE-2025-1013 | Mozilla Firefox up to 128.6/134.x Private Browsing Mode race condition
CVE-2025-1014 | Mozilla Firefox up to 128.6 Certificate Store certificate validation
CVE-2025-1014 | Mozilla Thunderbird up to 128.6 Certificate Store certificate validation
CVE-2025-1015 | Mozilla Thunderbird up to 128.6 Address Book cross site scripting
Freedesktop 和 Alpine Linux 寻找新托管商
CVE-2024-11623 | goauthentik up to 2024.10.3 cross site scripting
DaggerFly-Linked Linux Malware Targets Network Appliances
CVE-2024-11623 | goauthentik up to 2024.10.3 cross site scripting
The Anatomy of Abyss Locker Ransomware Attack
Abyss Locker ransomware targets critical network devices with swift, disruptive attacks. This blog breaks down its tactics and defense strategies.
The post The Anatomy of Abyss Locker Ransomware Attack appeared first on Sygnia.