Aggregator
CVE-2025-21993 | Linux Kernel up to 6.1.131/6.6.83/6.12.19/6.13.7 iSCSI boot subnet-mask ibft_attr_show_nic out-of-bounds
CVE-2025-21989 | Linux Kernel up to 6.12.19/6.13.7 AMD Display dce60_tg_funcs null pointer dereference
CVE-2025-21987 | Linux Kernel up to 6.12.17/6.13.5 AMD GPU amdgpu_ttm_clear_buffer uninitialized pointer
CVE-2025-21992 | Linux Kernel up to 6.1.131/6.6.83/6.12.19/6.13.7 HID denial of service
CVE-2025-21991 | Linux Kernel up to 6.1.131/6.6.83/6.12.19/6.13.7 load_microcode_amd array index
CVE-2025-21990 | Linux Kernel up to 6.12.19/6.13.7 AMD GPU null pointer dereference
近期使用法国内政部车辆信息文件为诱饵的攻击事件分析
Gootloader Malware Resurfaces in Google Ads for Legal Docs
How to Hunt and Investigate Linux Malware
Linux cyber threats may be less common than Windows ones, but they can be equally if not more damaging. Defending against these requires proactive efforts. Eric Parker, a popular YouTube blogger and malware analyst, recently showed his approach to investigating and collecting intelligence on Linux malware. Here is a recap of his video. How to […]
The post How to Hunt and Investigate Linux Malware appeared first on ANY.RUN's Cybersecurity Blog.
Пару минут — и новый паспорт: ChatGPT обманул проверку личности
Cisco warns of CSLU backdoor admin account used in attacks
IP-адрес, время, железо — Роскомнадзор знает больше, чем ваш браузер
Firefox 137 Launches with Patches for High-Severity Security Flaws
Mozilla has officially launched Firefox 137 with crucial security fixes aimed at addressing several high-severity vulnerabilities reported by security researchers. As part of its April 1, 2025, Mozilla Foundation Security Advisory (MFSA 2025-20), the foundation detailed three significant Common Vulnerabilities and Exposures (CVEs), which could have permitted attackers to exploit users’ machines through various means, […]
The post Firefox 137 Launches with Patches for High-Severity Security Flaws appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Google Cloud Platform Vulnerability Exposes Sensitive Data to Attackers
A privilege escalation vulnerability in Google Cloud Platform (GCP), dubbed “ImageRunner,” was recently discovered and fixed. The flaw, which Tenable Research brought to light, potentially allowed attackers to exploit Google Cloud Run permissions and access sensitive data stored in private container images. Discovering the ImageRunner Vulnerability The vulnerability hinged on improper permission handling for identities […]
The post Google Cloud Platform Vulnerability Exposes Sensitive Data to Attackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
How to map and manage your cyber attack surface with EASM
In today’s digital landscape, understanding your organization’s attack surface is crucial for maintaining robust cybersecurity. To effectively manage and mitigate the cyber-risks hiding in modern attack surfaces, it’s important to adopt an attacker-centric approach. In this article, we will be diving deeper into a company’s attack surface, what might have been forgotten and overlooked during the day-to-day rush and how cybersecurity professionals can regain the momentum and overview with the help of external attack surface … More →
The post How to map and manage your cyber attack surface with EASM appeared first on Help Net Security.
More From Our Main Blog: The Overlooked Six | AWS Security Blind Spots
In this guest blog post, learn about six commonly missed AWS 'blind spots' that could lead to risk in your cloud infrastructure.
The post The Overlooked Six | AWS Security Blind Spots appeared first on SentinelOne.