Aggregator
Apple warns customers targeted in recent spyware attacks
Going Deeper in Cyber Skills: Can You Spot the Not?
In their careers, cyber professionals are expected to move beyond clicking through alerts and develop more depth in the field. The "easy button" may feel efficient, but it could be your downfall if you don't push yourself to truly learn the ins and outs of cyber defense.
Pentagon Releases Long-Awaited Contractor Cybersecurity Rule
The Department of War has published the final version of its Cybersecurity Maturity Model Certification Rule - dubbed CMMC 2.0 - following years of collaboration with defense vendors on a tiered-approach to developing standardized cybersecurity requirements across the Defense Industrial Base.
Closing OT Blind Spots With Asset Visibility, Culture
Luis Contasti Aguirre from Merck shares how visibility into OT assets, clear processes and a strong risk-aware culture help secure critical systems. He explains how aligning people, process and technology strengthens compliance, reduces false positives and ensures operational resilience.
AI Security Risks Mirror Past Application Flaws
Large language models pose systemic risks, and the rush to release AI products revives old security flaws. Prompt injections and familiar application vulnerabilities expose gaps created when speed outweighs safety, said Joern Schneeweisz, principal security engineer at GitLab.
Cryptohack Roundup: SwissBorg's $41M Exploit
SwissBorg $41M hack, hidden malicious npm code, sanctions on Southeast Asian networks, California launderer's sentencing, Kinto's shuttering, Venus Protocol pays back victim, Nemo Protocol hack, DOJ's $5M recovery effort, Lagarde's proposed rules and the SEC-CFTC plan for market clarity.
BSidesSF 2025: Understanding IRSF Fraud: Protecting Against SMS Exploitation
Creator, Author and Presenter: Vien Van, Senthil Sivasubramanian
Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon - certainly a venue like no other; and via the organization's YouTube channel.
Additionally, the organization is welcoming volunteers for the BSidesSF Volunteer Force, as well as their Program Team & Operations roles. See their succinct BSidesSF 'Work With Us' page, in which, the appropriate information is to be had!
The post BSidesSF 2025: Understanding IRSF Fraud: Protecting Against SMS Exploitation appeared first on Security Boulevard.
CVE-2025-9951 | FFmpeg up to 7.x jpeg2000dec heap-based overflow (GHSA-39q3-f8jq-v6mg / EUVD-2025-27255)
CVE-2025-10201 | Google Chrome up to 140.0.7339.80 Mojo access control (ID 439305 / EUVD-2025-27600)
CVE-2025-10200 | Google Chrome up to 140.0.7339.80 Serviceworker use after free (ID 440454 / EUVD-2025-27601)
CVE-2025-58367 | seperman deepdiff up to 8.6.0 posix.system dynamically-determined object attributes (GHSA-mw26-5g2v-hqw3 / EUVD-2025-27049)
CVE-2025-53791 | Microsoft Edge up to 138.0.3351.65 access control (Nessus ID 264543)
WorldLeaks
You must login to view this content