Aggregator
CVE-2019-5747 | BusyBox up to 1.30.0 Incomplete Fix CVE-2018-20679 DHCP Message out-of-bounds (USN-3935-1 / EUVD-2019-15320)
CVE-2018-15687 | systemd up to 239 chown_one race condition (USN-3816-1 / EDB-45715)
CVE-2018-15686 | systemd up to 239 unit_deserialize deserialization (RHSA-2019:2091 / EDB-45714)
CVE-2018-15686 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment Calico deserialization (EDB-45714 / ID 277521)
CVE-2019-12900 | bzip2 up to 1.0.6 decompress.c BZ2_decompress out-of-bounds write (K68713584 / Nessus ID 210436)
CVE-2019-12900 | Oracle Database Server 11.2.0.4/12.1.0.2/12.2.0.1/18c/19c bzip2 out-of-bounds write (Nessus ID 210436)
【高级睡眠混淆技术】| Cronos
到 2029 年,全球运营商将在 AI 安全方面投资超过 170 亿美元
Да, ИИ создаёт код быстро. Но потом человек 3 часа ломает голову, как это вообще должно было работать
Top 5 Best Cybersecurity Companies Leading The Industry Right Now in 2025
If you’re shopping around for cybersecurity solutions in 2025, you’re probably feeling a little overwhelmed and not sure where to turn. Not only are there more attacks than ever before (and more sophisticated), but there are a wide range of potential security vendors that all promise to do the same thing; protect your business, its […]
The post Top 5 Best Cybersecurity Companies Leading The Industry Right Now in 2025 appeared first on Cyber Security News.
QNAP 修复 Qsync Central 及 File Station 5 的 SQL 注入及证书验证漏洞
美国最高法院允许 DOGE 不受限制地访问 SSA 系统
CVE-2024-56898 | Geovision GV-ASWeb up to 6.1.0.0 HTTP Request access control (EDB-52189)
UNITED NATURAL FOODS, INC. has Filed Form 8-K Due to a Cybersecurity Incident
税务解决方案公司 Optima Tax Relief 遭勒索软件攻击,数据泄露
威胁行为者针对 Gluestack 软件包发起供应链攻击,每周有超过 95 万次的下载面临风险
Malicious npm Packages as Utilities Let Attackers Destroy Production Systems
Security researchers have uncovered a disturbing new threat in the npm ecosystem where malicious packages masquerade as legitimate utilities while harboring destructive backdoors capable of wiping entire production environments. These packages represent a significant escalation from traditional credential theft or cryptocurrency mining attacks, focusing instead on complete system destruction that could cripple business operations. The […]
The post Malicious npm Packages as Utilities Let Attackers Destroy Production Systems appeared first on Cyber Security News.