Aggregator
CVE-2022-49582 | Linux Kernel up to 5.18.14 dsa_port_reset_vlan_filtering null pointer dereference (Nessus ID 246640)
CVE-2024-26887 | Linux Kernel up to 6.6.22/6.7.10/6.8.1 Bluetooth memory leak (Nessus ID 246643)
CVE-2022-0646 | Linux Kernel up to 5.17-rc5 MCTP Subsystem mctp-serial.c cancel_work_sync cleanup (Nessus ID 246647)
签署捐赠誓言的 256 名亿万富翁只有 9 人信守诺言
CVE-2021-23955 | Mozilla Firefox up to 84.x Pointer Lock clickjacking (Nessus ID 246650)
CVE-2023-32216 | Mozilla Firefox up to 112 memory corruption (Nessus ID 246649)
CVE-2021-28691 | Xen use after free (Nessus ID 246652)
CVE-2024-27405 | Linux Kernel up to 6.7.6 gadget denial of service (Nessus ID 246654 / WID-SEC-2024-1188)
CVE-2021-47111 | Linux Kernel up to 5.10.42/5.12.9 xen-netback kthread_stop use after free (6b53db8c4c14/caec9bcaeb1a/107866a8eb0b / Nessus ID 246652)
CVE-2023-52441 | Linux Kernel up to 5.15.144/6.1.52/6.4/6.4.15 ksmbd init_smb2_rsp_hdr out-of-bounds (Nessus ID 246656)
SecWiki News 2025-08-09 Review
更多最新文章,请访问SecWiki
CVE-2025-8755 | macrozheng mall up to 1.0.3 com.macro.mall.portal.controller UmsMemberController.java detail orderId authorization (EUVD-2025-24050)
CVE-2025-37777 | Linux Kernel up to 6.14.3/6.15-rc2 Ksmbd __smb2_lease_break_noti use after free (EUVD-2025-13043 / Nessus ID 240657)
CVE-2020-13898 | janus-gateway up to 0.10.0 sdp.c janus_sdp_process null pointer dereference (Nessus ID 246659)
CVE-2020-14836 | Oracle MySQL Server up to 8.0.21 Optimizer denial of service (Nessus ID 246661)
CVE-2024-56556 | Linux Kernel up to 6.12.3 binder_add_freeze_work use after free (Nessus ID 246665 / WID-SEC-2024-3762)
South Shore Regional Emergency Communications Center Hit by Cyber Attack
Tips to Protect Yourself on LinkedIn from Fraud, Social Engineering, and Espionage
LinkedIn is a great communication tool for business professionals that informs, provides opportunities, and fosters collaboration — which is exactly why it is attractive to sophisticated cyber adversaries, including aggressive nation state actors, who use LinkedIn for nefarious activities such as information gathering, target profiling, human-asset engagement, fraud, social engineering, and trust building.
Urgent and time sensitive messages, especially regarding career opportunities, target cognitive vulnerabilities and are leveraged by attackers to manipulate victims.
Use the tool, but know the dangers and take necessary precautions.
- Don’t share your clearance level or indicators of wealth — this makes you a preferred target
- Don’t share details of confidential work activities, such as project details, coworkers, or plans
- Keep it professional and don’t expose private personal information about yourself, family, or others (ex. wishing someone a happy 25th birthday — gives a fraudster that person’s birthdate!)
- Expect to be contacted by fraudsters and people with malicious intent
- Don’t assign credibility, without verification, to what someone lists on their profile or in in their posts
- Understand there will be some level of fake accounts, impersonations, fictitious company listings, phony job postings, and news misinformation
- Be careful with Direct Messaging (DM), as it can be employed for spam, phishing, distributing dangerous attachments, and sending links to malicious sites
Use critical thinking and common sense — don’t be an easy victim or useful idiot.
Stay updated on cybersecurity trends and risk patterns. If unsure about a situation, ask cybersecurity professionals (we live for this stuff and are also on LinkedIn)!
The post Tips to Protect Yourself on LinkedIn from Fraud, Social Engineering, and Espionage appeared first on Security Boulevard.