Aggregator
CVE-2025-39683 | Linux Kernel up to 6.17-rc2 tracing trace_get_user out-of-bounds
CVE-2025-39680 | Linux Kernel up to 6.16.3/6.17-rc2 i2c ismt_access out-of-bounds
CVE-2025-39675 | Linux Kernel up to 6.17-rc2 mod_hdcp_hdcp1_create_session null pointer dereference
CVE-2025-39673 | Linux Kernel up to 6.17-rc2 ppp_fill_forward_path race condition
CVE-2025-38736 | Linux Kernel prior 6.12.44/6.16.4/6.17-rc2/6.17-rc3 net asix_devices initialization
CVE-2025-38732 | Linux Kernel up to 6.17-rc2 netfilter include/linux/skbuff.h reference count
CVE-2025-38731 | Linux Kernel up to 6.16.3/6.17-rc2 vm_bind_ioctl double free
CVE-2025-39681 | Linux Kernel up to 6.17-rc2 resctrl_cpu_detect divide by zero
CVE-2025-39674 | Linux Kernel up to 6.16.3/6.17-rc2 ESI Feature platform_device_msi_init_and_alloc_irqs null pointer dereference
CVE-2025-39677 | Linux Kernel up to 6.16.3/6.17-rc2 sched qdisc_dequeue_internal infinite loop
CVE-2025-38735 | Linux Kernel up to 6.1.148/6.6.102/6.12.43/6.16.3/6.17-rc2 gve shutdown null pointer dereference
CVE-2025-38734 | Linux Kernel up to 6.6.102/6.12.43/6.16.3/6.17-rc2 net smc_listen_out null pointer dereference
Физики создали материю где время становится пространством
Anyone Using Agentic AI Needs to Understand Toxic Flows
Microsoft now enforces MFA on Azure Portal sign-ins for all tenants
IOC Alert: Lumma Stealer Command-and-Control Infrastructure
Tabletop Exercises: Are They Worth It? (Yes)
“Fail. Fail fast.” How often, if at all, does your organization practice failing safely? That’s the goal of a tabletop exercise. You simulate a cyber attack against your organization, not to win, but to expose security, communication, and personnel gaps. It allows you to test the decision-making of leadership, and promote effective communication before [...]
The post Tabletop Exercises: Are They Worth It? (Yes) appeared first on Hurricane Labs.
The post Tabletop Exercises: Are They Worth It? (Yes) appeared first on Security Boulevard.
TAG-150 Hackers Deploying Self-Developed Malware Families to Attack Organizations
A sophisticated new threat actor designated TAG-150 has emerged as a significant cybersecurity concern, demonstrating rapid development capabilities and technical sophistication in deploying multiple self-developed malware families since March 2025. The group has successfully created and deployed CastleLoader, CastleBot, and their latest creation, CastleRAT, a previously undocumented remote access trojan that represents a concerning evolution […]
The post TAG-150 Hackers Deploying Self-Developed Malware Families to Attack Organizations appeared first on Cyber Security News.
Palo Alto Networks Extends Scope and Reach of SASE Platform
Palo Alto Networks this week revealed it will update its secure access service edge (SASE) platform that adds an ability to identify and neutralize malware in real time as end users employ an enterprise-grade browser that is integrated into the platform. Prisma SASE 4.0 also adds more than 140 pre-trained machine learning classifiers and customizable..
The post Palo Alto Networks Extends Scope and Reach of SASE Platform appeared first on Security Boulevard.