Aggregator
CVE-2024-5477 | HP PC improper restriction of software interfaces to hardware features
CVE-2025-23294 | NVIDIA WebDataset os command injection
CVE-2024-10219 | GitLab Community Edition/Enterprise Edition up to 18.0.5/18.1.3/18.2.1 API Endpoint authorization (Issue 500134 / WID-SEC-2025-1816)
200 миллионов часов прослушки: Microsoft построила цифровой концлагерь для 5 миллионов палестинцев
Breaking Clean: Dodging Sanitization with Event Handler Tricks
Adobe’s August 2025 Patch Tuesday – 60 Vulnerabilities Patches Across Multiple Products
Adobe has released a comprehensive security update addressing 60 critical vulnerabilities across 13 of its flagship products as part of its August 2025 Patch Tuesday initiative. The massive security bulletin, published on August 12, 2025, represents one of the most significant coordinated vulnerability disclosure events in Adobe’s recent history, affecting everything from Creative Cloud applications […]
The post Adobe’s August 2025 Patch Tuesday – 60 Vulnerabilities Patches Across Multiple Products appeared first on Cyber Security News.
During Deadly Floods, Central Texas Hit with Online Scams: BforeAI
In the 10 days after the deadly floods in Central Texas began, researcher's with BeforeAI's PreCrime Labs identified more than 70 malicious or suspicious domains that used the natural disaster to steal money and information from victims or those looking to help, the latest in the common trend of "disaster scams."
The post During Deadly Floods, Central Texas Hit with Online Scams: BforeAI appeared first on Security Boulevard.
3 分钟,我学会了像鸟儿一样飞行 | New Things
Palo Alto Networks helps organizations accelerate their quantum readiness
Palo Alto Networks announced two new security solutions to help organizations confidently navigate the quantum landscape, and to keep pace with highly dynamic cloud and AI environments. These innovations provide enterprises with the visibility, agility and defenses needed to accelerate their quantum readiness and secure their workloads in a multicloud world. “The quantum threat to encryption is no longer theoretical; it’s an inevitability that demands action now. With these latest innovations that cover the entire … More →
The post Palo Alto Networks helps organizations accelerate their quantum readiness appeared first on Help Net Security.
Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS
CVE-2024-7402 | Netskope Client up to 123.0.15/126.0.8/128.x integrity check (kpsa-2024-002)
CVE-2025-5942 | Netskope Client up to 126.0.8/128.x on Windows epdlpdrv.sys heap-based overflow (nskpsa-2025-003)
CVE-2025-0309 | Netskope Client up to 128.x Server Connection Endpoint certificate validation
CVE-2025-5941 | Netskope Client up to 128.0.0 NS Client out-of-bounds (nskpsa-2025-001)
CVE-2025-3414 | Structured Content wpsc Plugin up to 1.6.x on WordPress cross site scripting
CVE-2025-8932 | 1000 Projects Sales Management System 1.0 sales.php ssalescat sql injection
CVE-2025-8938 | TOTOLINK N350R 1.2.3-B20130826 Telnet Service /boafrm/formSysTel TelEnabled backdoor
Canada’s House of Commons investigating data breach after cyberattack
How ShinyHunters Breached Google, Adidas, Louis Vuitton and More in Ongoing Salesforce Attack Campaign
The cybersecurity landscape witnessed a sophisticated and ongoing attack campaign throughout 2025 that has successfully compromised major corporations, including Google, Adidas, Louis Vuitton, and numerous other high-profile organizations. This comprehensive technical analysis reveals how the notorious cybercriminal group ShinyHunters, in apparent collaboration with Scattered Spider, has executed one of the most successful social engineering campaigns […]
The post How ShinyHunters Breached Google, Adidas, Louis Vuitton and More in Ongoing Salesforce Attack Campaign appeared first on Cyber Security News.