Aggregator
CVE-2025-23165 | Node.js up to 20.19.1/22.15.0 UTF-16 Path uv_fs_s.file ReadFileUtf8 denial of service (Nessus ID 236766 / WID-SEC-2025-1055)
Перехват звонков, активация микрофона, копирование переписки. Оружие ФБР теперь продают за $199 любому желающему
Kenyan Filmmakers Installed With FlexiSPY Spyware That Monitors Messages and Social Media
Four Kenyan filmmakers became victims of sophisticated surveillance when FlexiSPY spyware was covertly installed on their devices while in police custody, according to forensic analysis conducted by the University of Toronto’s Citizen Lab. The incident occurred on or around May 21, 2025, after authorities seized the devices during arrests connected to allegations surrounding the BBC […]
The post Kenyan Filmmakers Installed With FlexiSPY Spyware That Monitors Messages and Social Media appeared first on Cyber Security News.
NASA 禁止中国公民参与其太空项目
New EggStreme Malware With Fileless Capabilities Leverages DLL Sideloading to Execute Payloads
A previously unknown advanced persistent threat (APT) group has unleashed a new fileless malware framework, dubbed EggStreme, in a highly targeted espionage campaign against strategic organizations. Emerging in early 2024, EggStreme exploits the legitimate Windows Mail executable (WinMail[.]exe) to sideload a malicious library, allowing attackers to achieve in-memory code execution without writing decrypted payloads to […]
The post New EggStreme Malware With Fileless Capabilities Leverages DLL Sideloading to Execute Payloads appeared first on Cyber Security News.
Why ‘identity user baselines’ are key to stopping adversaries
Kerberoasting, Microsoft, and a Senator
Cyberattacks against schools driven by a rise in student hackers, ICO warns
CVE-2025-48976 | Apache Tomcat up to 9.0.105/10.1.41/11.0.7 Commons FileUpload denial of service (EUVD-2025-18407 / Nessus ID 240060)
Дело о смайлике. Суд решил, что клоун и «хабалка» — не повод для штрафа, если нет лингвистической экспертизы
Google fixes critical Chrome flaw, researcher earns $43K
Continuous Compliance
Organizations manage sensitive data, operate under complex regulations, and face relentless cyber threats. Yet traditional compliance—point-in-time audits, annual assessments, and static reporting—is no longer enough. Attackers don’t wait until your next audit, and regulators expect security to be proactive, not reactive. That’s why modern organizations are embracing continuous compliance—a model that ensures compliance is maintained
The post Continuous Compliance appeared first on Seceon Inc.
The post Continuous Compliance appeared first on Security Boulevard.
kkRAT Employs Network Communication Protocol to Steal Clipboard Contents
In early May 2025, cybersecurity researchers began tracking a novel Remote Access Trojan (RAT) targeting Chinese-speaking users via phishing sites hosted on GitHub Pages. Masked as legitimate installers for popular applications, the initial ZIP archives contained malicious executables engineered to bypass sandbox and virtual machine defenses. Once executed, the first-stage shellcode performs time stability analysis […]
The post kkRAT Employs Network Communication Protocol to Steal Clipboard Contents appeared first on Cyber Security News.