Aggregator
CVE-2024-23731 | Embedchain up to 0.1.56 OpenAPI Loader openapi.py yaml.load argument injection
CVE-2024-23218 | Apple iOS/iPadOS RSA PKCS Private Key channel accessible (EUVD-2024-20737)
CVE-2024-23218 | Apple watchOS RSA PKCS Private Key channel accessible (EUVD-2024-20737)
CVE-2024-23218 | Apple macOS RSA PKCS Private Key channel accessible (EUVD-2024-20737)
CVE-2024-23207 | Apple iOS/iPadOS information disclosure
CVE-2024-23207 | Apple watchOS information disclosure
CVE-2024-23207 | Apple macOS information disclosure
CVE-2024-23210 | Apple iOS/iPadOS Phone Number information disclosure (EUVD-2024-20729)
CVE-2024-23210 | Apple watchOS Phone Number information disclosure (EUVD-2024-20729)
CVE-2024-23210 | Apple tvOS Phone Number information disclosure
CVE-2024-23210 | Apple macOS Phone Number information disclosure
Ukraine claims it hacked Tupolev, Russia’s strategic warplane maker
How Neuroscience Can Help Us Battle 'Alert Fatigue'
CVE-2022-34707 | Microsoft Windows up to Server 2022 Kernel use after free (EUVD-2022-37657)
Business Email Compromise Attacks: How To Detect Them Early
Business Email Compromise (BEC) attacks don’t need malware to do damage. All it takes is one convincing message; a fake login prompt, a cleverly disguised link, and an employee’s credentials are gone. From there, attackers can quietly access inboxes, exfiltrate sensitive documents, and impersonate executives for financial fraud. The worst part is that these attacks […]
The post Business Email Compromise Attacks: How To Detect Them Early appeared first on Cyber Security News.
New Crocodilus Malware Let Attacker Gain Full Control of Your Android Device
A sophisticated new Android banking Trojan named Crocodilus has emerged as a significant global threat, demonstrating advanced device-takeover capabilities that grant cybercriminals unprecedented control over infected smartphones. First discovered in March 2025, this malware has rapidly evolved from localized test campaigns to a worldwide operation targeting financial institutions and cryptocurrency platforms across multiple continents. The […]
The post New Crocodilus Malware Let Attacker Gain Full Control of Your Android Device appeared first on Cyber Security News.