Aggregator
CVE-2017-14180 | Apport up to 2.20.7 resource consumption (USN-3480-2 / Nessus ID 104712)
CVE-2018-16790 | libbson 1.12.0 bson-iter.c _bson_iter_next_internal memory corruption (FEDORA-2018-77d864ff39 / Nessus ID 117814)
CVE-2019-11483 | Apport Crash Dump information disclosure (usn-4171-1)
CVE-2019-15790 | Apport on Ubuntu /proc/pid get_pid_info unnecessary privileges (Bug 172858)
CVE-2020-15702 | Apport toctou
CVE-2020-15890 | LuaJIT up to 2.1.0-beta3 __gc out-of-bounds (Nessus ID 255190)
CVE-2020-24372 | LuaJIT up to 2.1.0-beta3 lj_err.c lj_err_run out-of-bounds (Nessus ID 255190)
CVE-2019-14196 | Das U-Boot up to 2019.07 nfs_lookup_reply memory corruption (Nessus ID 235044)
CVE-2013-20001 | OpenZFS up to 2.0.3 NFS Share access control (Nessus ID 233873)
CVE-2015-1318 | Apport up to 2.17.0 Crash Reporter usr/share/apport/apport access control (USN-2569-1 / EDB-36746)
CVE-2015-1325 | Apport on Ubuntu race condition (EDB-37088 / Nessus ID 83777)
New TruffleNet BEC Campaign Leverages AWS SES Using Stolen Credentials to Compromise 800+ Hosts
Identity compromise has become one of the most significant threats facing cloud infrastructure, particularly when attackers gain access to legitimate credentials. These valid access keys enable adversaries to bypass traditional security defenses, creating opportunities for widespread exploitation. Amazon Web Services environments have witnessed a surge in such attacks, with the Simple Email Service emerging as […]
The post New TruffleNet BEC Campaign Leverages AWS SES Using Stolen Credentials to Compromise 800+ Hosts appeared first on Cyber Security News.
Fake Solidity VSCode extension on Open VSX backdoors developers
CVE-2025-45663 | NetSurf 3.11 dom_event uninitialized pointer (Nessus ID 272161)
Defense in Depth for AI: The MCP Security Architecture You’re Missing
As AI agents become integral to cloud native applications, the Model Context Protocol (MCP) has emerged as a leading standard for enabling these agents to interact with external tools and data sources. But with this new architectural pattern comes a critical security challenge: MCP-based systems require protection at three distinct layers, not just one. The..
The post Defense in Depth for AI: The MCP Security Architecture You’re Missing appeared first on Security Boulevard.
LeakNet
You must login to view this content
Synthetic Identity Theft in 2025: How Digital Identity Intelligence Detects Fraud That Doesn’t Exist
Synthetic identity theft — where criminals combine real and fabricated data to create entirely new “people” — is one of the fastest-growing forms of digital fraud. Unlike traditional identity theft, which steals from real individuals, synthetic identity fraud manufactures fake identities that appear legitimate to verification systems. This sophisticated type of fraud is costing organizations …
The post Synthetic Identity Theft in 2025: How Digital Identity Intelligence Detects Fraud That Doesn’t Exist appeared first on Security Boulevard.