Aggregator
CVE-2022-50152 | Linux Kernel up to 5.19.1 usb of_parse_phandle reference count
CVE-2022-50135 | Linux Kernel up to 5.19.1 qp_init rxe_create_qp null pointer dereference
CVE-2022-50139 | Linux Kernel up to 5.10.136/5.15.60/5.18.17/5.19.1 usb ast_vhub_init_desc reference count
Erkenning voor adjudant Paul en kapitein-vlieger reservist Michiel
CVE-2022-50136 | Linux Kernel up to 5.4.210/5.10.136/5.15.60/5.18.17/5.19.1 RDMA IW_CM_EVENT_CONNECT_REPLY privilege escalation
CVE-2022-50132 | Linux Kernel up to 5.10.136/5.15.60/5.18.17/5.19.1 usb cdns3_gadget_ep_dequeue null pointer dereference
CVE-2022-50141 | Linux Kernel up to 5.19.1 mmc of_find_matching_node null pointer dereference
CVE-2022-50138 | Linux Kernel up to 5.10.136/5.15.60/5.18.17/5.19.1 RDMA __qedr_alloc_mr memory leak
CVE-2022-50131 | Linux Kernel up to 5.10.136/5.15.60/5.18.17/5.19.1 HID hid-mcp2221.c mcp_smbus_write len buffer overflow
CVE-2022-50140 | Linux Kernel up to 5.19.1 bitmap_free memory leak
Cyber Centre advice on securing operational technology systems
Cyber Centre advice on securing operating technology systems
Zyxel NWA50AX Pro Hit by N-Day Flaw Allowing Arbitrary File Deletion
A recent vulnerability has been discovered in the Zyxel NWA50AX Pro, a WiFi 6 access point for small businesses, exposing it to an n-day flaw that allows arbitrary file deletion via a misconfigured CGI endpoint. This issue, tracked as CVE-2024-29974, highlights the risks of shared codebases and incomplete patching in embedded devices. Discovery and Technical […]
The post Zyxel NWA50AX Pro Hit by N-Day Flaw Allowing Arbitrary File Deletion appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
善恶有报:两个著名病毒作者的初心与归宿
Hackers Exploit Transit Mode in Apple Pay and GPay to Steal Money
Mobile wallets like Apple Pay and Google Pay (GPay) have revolutionized the way we pay, offering speed and convenience that traditional cards can’t match. But as recent research and real-world incidents show, these digital wallets are not immune to attack. In fact, some of their most convenient features—like Express Transit mode—are now being exploited by […]
The post Hackers Exploit Transit Mode in Apple Pay and GPay to Steal Money appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Microsoft Enhances Office 365 Defender to Stop Email Bombing Campaigns
Microsoft has announced a significant enhancement to its Office 365 Defender suite with the introduction of Mail Bombing Detection, a new feature designed to combat the rising threat of email bombing attacks. This capability will be rolled out globally, starting in late June 2025, and is expected to reach all customers by late July 2025. […]
The post Microsoft Enhances Office 365 Defender to Stop Email Bombing Campaigns appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Threat Hunting: Hands-on Tips for SOC Analysts and MSSPs
Editor’s note: The current article is authored by Clandestine, threat researcher and threat hunter. You can find Clandestine on X. Threat actors today are continuously developing sophisticated techniques to evade traditional detection methods. ANY.RUN’s Threat Intelligence Lookup offers advanced capabilities for threat data gathering and analysis. As a specialized search engine, it allows security analysts to query […]
The post Threat Hunting: Hands-on Tips for SOC Analysts and MSSPs appeared first on ANY.RUN's Cybersecurity Blog.
Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data
Research by: Jaromír Hořejší (@JaromirHorejsi), Antonis Terefos (@Tera0017) Key Points Introduction Minecraft is a popular video game with a massive global player base, with over 200 million monthly active players. The game has also sold over 300 million copies, making it one of the best-selling video games ever. Minecraft supports mods (user-created modifications), which enrich the […]
The post Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data appeared first on Check Point Research.
AWS Makes Bevy of Updates to Simplify Cloud Security
Amazon Web Services (AWS) added a bevy of additional cybersecurity tools and services to its portfolio that collectively make securing its cloud computing platform simpler. Announced at the AWS re:Inforce 2025 conference, the additions include a preview of a revamped AWS Security Hub that now identifies which vulnerabilities from a threat perspective are potentially the..
The post AWS Makes Bevy of Updates to Simplify Cloud Security appeared first on Security Boulevard.