Aggregator
CVE-2024-27405 | Linux Kernel up to 6.7.6 gadget denial of service (Nessus ID 246654 / WID-SEC-2024-1188)
CVE-2021-47111 | Linux Kernel up to 5.10.42/5.12.9 xen-netback kthread_stop use after free (6b53db8c4c14/caec9bcaeb1a/107866a8eb0b / Nessus ID 246652)
CVE-2023-52441 | Linux Kernel up to 5.15.144/6.1.52/6.4/6.4.15 ksmbd init_smb2_rsp_hdr out-of-bounds (Nessus ID 246656)
SecWiki News 2025-08-09 Review
更多最新文章,请访问SecWiki
CVE-2025-37998 | Linux Kernel up to 5.15.182/6.1.138/6.6.90/6.12.28/6.14.6 openvswitch output_userspace iteration (EUVD-2025-16388 / Nessus ID 240323)
CVE-2025-8755 | macrozheng mall up to 1.0.3 com.macro.mall.portal.controller UmsMemberController.java detail orderId authorization (EUVD-2025-24050)
CVE-2025-37777 | Linux Kernel up to 6.14.3/6.15-rc2 Ksmbd __smb2_lease_break_noti use after free (EUVD-2025-13043 / Nessus ID 240657)
CVE-2025-38325 | Linux Kernel prior 6.12.35/6.15.4/6.16-rc3 ksmbd free_transport privilege escalation (EUVD-2025-20921)
CVE-2020-13898 | janus-gateway up to 0.10.0 sdp.c janus_sdp_process null pointer dereference (Nessus ID 246659)
CVE-2020-14836 | Oracle MySQL Server up to 8.0.21 Optimizer denial of service (Nessus ID 246661)
CVE-2025-38332 | Linux Kernel up to 6.15.3 scsi memcpy buffer overflow (EUVD-2025-20914 / Nessus ID 246664)
CVE-2024-56556 | Linux Kernel up to 6.12.3 binder_add_freeze_work use after free (Nessus ID 246665 / WID-SEC-2024-3762)
South Shore Regional Emergency Communications Center Hit by Cyber Attack
Tips to Protect Yourself on LinkedIn from Fraud, Social Engineering, and Espionage
LinkedIn is a great communication tool for business professionals that informs, provides opportunities, and fosters collaboration — which is exactly why it is attractive to sophisticated cyber adversaries, including aggressive nation state actors, who use LinkedIn for nefarious activities such as information gathering, target profiling, human-asset engagement, fraud, social engineering, and trust building.
Urgent and time sensitive messages, especially regarding career opportunities, target cognitive vulnerabilities and are leveraged by attackers to manipulate victims.
Use the tool, but know the dangers and take necessary precautions.
- Don’t share your clearance level or indicators of wealth — this makes you a preferred target
- Don’t share details of confidential work activities, such as project details, coworkers, or plans
- Keep it professional and don’t expose private personal information about yourself, family, or others (ex. wishing someone a happy 25th birthday — gives a fraudster that person’s birthdate!)
- Expect to be contacted by fraudsters and people with malicious intent
- Don’t assign credibility, without verification, to what someone lists on their profile or in in their posts
- Understand there will be some level of fake accounts, impersonations, fictitious company listings, phony job postings, and news misinformation
- Be careful with Direct Messaging (DM), as it can be employed for spam, phishing, distributing dangerous attachments, and sending links to malicious sites
Use critical thinking and common sense — don’t be an easy victim or useful idiot.
Stay updated on cybersecurity trends and risk patterns. If unsure about a situation, ask cybersecurity professionals (we live for this stuff and are also on LinkedIn)!
The post Tips to Protect Yourself on LinkedIn from Fraud, Social Engineering, and Espionage appeared first on Security Boulevard.