Aggregator
中国药企走向全球
CVE-2023-27922 | Stefano Lissa Newsletter Plugin up to 7.6.8 on WordPress cross site scripting (EUVD-2023-31648)
CVE-2023-27920 | SolarView Compact SV-CPT-MC310/Compact SV-CPT-MC310F up to 8.9 Date Setting access control (EUVD-2023-31646)
CVE-2023-27921 | Jins Meme Core up to 2.2.0 hard-coded key (EUVD-2023-31647)
CVE-2023-27919 | NEXT ENGINE Integration Plugin 2.0 on EC-CUBE improper authentication (EUVD-2023-31645)
攻击链贯穿端边云!边缘网络访问三大核心风险预警
中央网信办召开优化营商网络环境工作经验总结交流会;小模型能否扛起钓鱼网站识别大旗?| 牛览
Threat Actors Allegedly Listed iOS 26 Full‑Chain 0‑Day Exploit on Dark Web
A threat actor operating under the alias ResearcherX has posted what they claim to be a full‑chain zero‑day exploit targeting Apple’s recently released iOS 26 operating system. The listing, which appeared on a prominent dark web marketplace, alleges that the exploit leverages a critical memory‑corruption vulnerability within the iOS Message Parser. If proven genuine, this […]
The post Threat Actors Allegedly Listed iOS 26 Full‑Chain 0‑Day Exploit on Dark Web appeared first on Cyber Security News.
CVE-2025-54057 | Apache SkyWalking up to 10.2.0 cross site scripting (EUVD-2025-199821)
CVE-2025-13762 | CyberArk Secure Web Sessions Extension prior 2.2.30305 on Chrome denial of service (EUVD-2025-199782)
お知らせ:JPCERT/CC ベストレポーター賞 2025
CVE-2025-12758 | Validator up to 13.15.21 isLength incomplete filtering of one or more instances of special elements (SNYK-JS-VALIDATOR-13653476 / EUVD-2025-199795)
CVE-2025-3784 | Mitsubishi Electric GX Works2 cleartext storage (EUVD-2025-199803)
CVE-2025-34351 | Ray Team Anyscale Ray 2.52.0 API insecure default initialization of resource (GHSA-w8vc-465m-jjw6)
CrossDesk – 开源、跨平台、轻量级远程控制工具|即开即用
Hottest cybersecurity open-source tools of the month: November 2025
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Heisenberg: Open-source software supply chain health check tool Heisenberg is an open-source tool that checks the health of a software supply chain. It analyzes dependencies using data from deps.dev, Software Bills of Materials (SBOMs), and external advisories to measure package health, detect risks, and generate reports for individual dependencies or entire projects. VulnRisk: Open-source vulnerability risk assessment … More →
The post Hottest cybersecurity open-source tools of the month: November 2025 appeared first on Help Net Security.
ICEBREAKER 2025: как защищать веб-ресурсы от киберугроз в 2026 году?
Гиперзвук с «Алиэкспресса». Китайский стартап запустил конвейер дешевых ракет, собранных из автомобильных чипов.
Hackers Tricks macOS Users to Execute Command in Terminal to Deliver FlexibleFerret Malware
Cybercriminals are successfully targeting Apple users through a sophisticated social engineering scheme that tricks victims into running harmful commands on their computers. The threat, called FlexibleFerret, is attributed to North Korean operators and represents a continuing evolution of the Contagious Interview campaign that has been active throughout 2025. The malware primarily spreads through fake job […]
The post Hackers Tricks macOS Users to Execute Command in Terminal to Deliver FlexibleFerret Malware appeared first on Cyber Security News.