Aggregator
CISA Launches Roadmap for the CVE Program
Polen bedankt Nederland voor neerhalen drones
New VMScape Spectre-BTI Attack Exploits Isolation Gaps in AMD and Intel CPUs
A novel speculative execution attack named VMSCAPE allows a malicious virtual machine (VM) to breach its security boundaries and steal sensitive data, like cryptographic keys, directly from its host system. The vulnerability, identified as CVE-2025-40300, affects a wide range of modern processors, including all current generations of AMD Zen (1 through 5) and Intel’s Coffee […]
The post New VMScape Spectre-BTI Attack Exploits Isolation Gaps in AMD and Intel CPUs appeared first on Cyber Security News.
CVE-2025-8681 | Pegasystems Pega Infinity up to 24.2.2 User Interface cross site scripting (WID-SEC-2025-2038)
CVE-2025-4674 | Google Go up to 1.23.10/1.24.4 cmd-go file inclusion (Nessus ID 241710 / WID-SEC-2025-1516)
CVE-2025-22871 | Google Go 1.23/1.24 net-http request smuggling (Nessus ID 233887 / WID-SEC-2025-0679)
CVE-2025-22870 | Google Go up to 1.23.6/1.24.0 IPv6 Zone ID interpretation input (Nessus ID 232161 / WID-SEC-2025-0485)
CVE-2025-23088 | Node.js up to 19.9.0 unmaintained third party components (WID-SEC-2025-0156)
CVE-2025-23089 | Node.js up to 21.7.3 unmaintained third party components (WID-SEC-2025-0156)
Firefox 支持播放 MKV 内容
SecWiki News 2025-09-11 Review
Microsoft’s ‘Gross Cybersecurity Negligence Threatens National Security’
Roasting Redmond for Kerberoasting: “Like an arsonist selling firefighting services,” quips this 76-year-old.
The post Microsoft’s ‘Gross Cybersecurity Negligence Threatens National Security’ appeared first on Security Boulevard.
16 Minutes to Impact: npm Supply Chain Abuse Deploys crypto-draining malware
A targeted supply chain compromise of an open-source node package manager (npm) resulted in malicious updates to widely used packages, enabling cryptocurrency theft through traffic interception and transaction manipulation of browser-based crypto wallets.
The post 16 Minutes to Impact: npm Supply Chain Abuse Deploys crypto-draining malware appeared first on Sygnia.
New Google AppSheet Phishing Scam Deliver Fake Trademark Notices
Bluetooth, Wi-Fi и root-права в багажнике. Хакеры научились взламывать автомобили через Apple CarPlay
Fileless Malware Deploys Advanced RAT via Legitimate Tools
CVE-2025-10278 | YunaiV ruoyi-vue-pro up to 2025.09 /crm/contact/transfer ids/newOwnerUserId improper authorization
CVE-2025-10277 | YunaiV yudao-cloud up to 2025.09 /crm/receivable/submit ID improper authorization
Threat Actors Leveraging Open-Source AdaptixC2 in Real-World Attacks
In early May 2025, security teams began observing a sudden rise in post-exploitation activity leveraging an open-source command-and-control framework known as AdaptixC2. Originally developed to assist penetration testers, this framework offers a range of capabilities—file system manipulation, process enumeration, and covert channel tunneling—that have now been adopted by malicious actors. The framework’s modular design and […]
The post Threat Actors Leveraging Open-Source AdaptixC2 in Real-World Attacks appeared first on Cyber Security News.