Aggregator
Akamai Leads the Way: 2026 GigaOm Radar for Microsegmentation
2 weeks 1 day ago
Akamai Guardicore Segmentation, a Leader and Fast Mover in the 2026 GigaOm Radar for Microsegmentation report, balances innovation with platform strength.
Jacob Abrams
TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise
2 weeks 1 day ago
Python package LiteLLM compromised with credential-stealing malware linked to TeamPCP threat group
Vulnerabilities affecting Citrix NetScaler ADC and Citrix NetScaler Gateway
2 weeks 1 day ago
UK organisations encouraged to take immediate action to mitigate two recently disclosed vulnerabilities affecting Citrix NetScaler ADC and Citrix NetScaler Gateway.
Organizations Overlook AI Risk as Governance Fails to Keep Up
2 weeks 1 day ago
The Kill Chain Is Obsolete When Your AI Agent Is the Threat
2 weeks 1 day ago
In September 2025, Anthropic disclosed that a state-sponsored threat actor used an AI coding agent to execute an autonomous cyber espionage campaign against 30 global targets. The AI handled 80-90% of tactical operations on its own, performing reconnaissance, writing exploit code, and attempting lateral movement at machine speed.
This incident is worrying, but there's a scenario that should
The Hacker News
一场关于AI和安全度量产品的发布直播
2 weeks 1 day ago
文末可预约直播!
Ex-NSA Directors Discuss 'Red Line' for Offensive Cyberattacks
2 weeks 1 day ago
Four former NSA chiefs representing a near-complete history of US Cyber Command debate the role of offensive cyber in the government at RSAC.
Alexander Culafi
Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
2 weeks 1 day ago
The U.S. Department of Justice (DoJ) said a Russian national has been sentenced to two years in prison for managing a botnet that was used to launch ransomware attacks against U.S. companies.
Ilya Angelov, 40, of Tolyatti, Russia, was also fined $100,000. Angelov, who went by the online aliases "milan" and "okart," is said to have co-managed a Russia-based cybercriminal group known as TA551 (aka
The Hacker News
LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks
2 weeks 1 day ago
A slew of supply chain attacks against popular open source tools and packages appears to have been orchestrated by TeamPCP, a cybercriminal group that rose to prominence in late 2025. The latest victim of the group is BerryAI’s popular LiteLLM library, a unified interface that makes it easier for apps to switch between various LLMs: on March 24, TeamPCP uploaded two compromised versions (1.82.7 and 1.82.8) on PyPI that included a credential stealer and a … More →
The post LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks appeared first on Help Net Security.
Zeljka Zorz
CVE-2025-71161 | Linux Kernel up to 6.18.5 fec_read_bufs denial of service (Nessus ID 296381 / WID-SEC-2026-0215)
2 weeks 1 day ago
A vulnerability has been found in Linux Kernel up to 6.18.5 and classified as critical. Affected is the function fec_read_bufs. This manipulation causes denial of service.
This vulnerability appears as CVE-2025-71161. The attacker needs to be present on the local network. There is no available exploit.
The affected component should be upgraded.
vuldb.com
CVE-2025-71184 | Linux Kernel up to 6.12.65/6.18.5/6.19-rc4 btrfs_evict_inode null pointer dereference (EUVD-2025-206591 / Nessus ID 297464)
2 weeks 1 day ago
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.65/6.18.5/6.19-rc4. Impacted is the function btrfs_evict_inode. The manipulation leads to null pointer dereference.
This vulnerability is documented as CVE-2025-71184. The attack requires being on the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-53228 | Linux Kernel up to 6.2.15/6.3.2 amdgpu_cs_submit null pointer dereference (EUVD-2023-59856 / WID-SEC-2025-2053)
2 weeks 1 day ago
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.2.15/6.3.2. Impacted is the function amdgpu_cs_submit. Such manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2023-53228. The attack can only be initiated within the local network. No exploit exists.
You should upgrade the affected component.
vuldb.com
CVE-2025-39863 | Linux Kernel up to 6.6.104/6.12.45/6.16.5/6.17-rc4 brcmf_btcoex_detach use after free (Nessus ID 265463 / WID-SEC-2025-2099)
2 weeks 1 day ago
A vulnerability was found in Linux Kernel up to 6.6.104/6.12.45/6.16.5/6.17-rc4 and classified as critical. The affected element is the function brcmf_btcoex_detach. The manipulation results in use after free.
This vulnerability is identified as CVE-2025-39863. The attack can only be performed from the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2024-49979 | Linux Kernel up to 6.10.13/6.11.2 gso frag_list null pointer dereference (3fdd8c83e83f/2d4a83a44428/17bd3bd82f9f / Nessus ID 216493)
2 weeks 1 day ago
A vulnerability has been found in Linux Kernel up to 6.10.13/6.11.2 and classified as critical. This issue affects the function frag_list of the component gso. This manipulation causes null pointer dereference.
This vulnerability appears as CVE-2024-49979. The attacker needs to be present on the local network. There is no available exploit.
The affected component should be upgraded.
vuldb.com
CVE-2025-21676 | Linux Kernel up to 6.6.73/6.12.10 page_pool_dev_alloc_pages null pointer dereference (Nessus ID 216191 / WID-SEC-2025-0232)
2 weeks 1 day ago
A vulnerability was found in Linux Kernel up to 6.6.73/6.12.10. It has been classified as problematic. The impacted element is the function page_pool_dev_alloc_pages. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2025-21676. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is recommended.
vuldb.com
CVE-2025-21682 | Linux Kernel up to 6.12.10 netdev_update_features null pointer dereference (Nessus ID 216191 / WID-SEC-2025-0232)
2 weeks 1 day ago
A vulnerability was found in Linux Kernel up to 6.12.10. It has been rated as problematic. This impacts the function netdev_update_features. This manipulation causes null pointer dereference.
The identification of this vulnerability is CVE-2025-21682. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is advised.
vuldb.com
CVE-2024-47809 | Linux Kernel up to 6.6.65/6.12.4 dlm request_lock null pointer dereference (Nessus ID 216454 / WID-SEC-2025-0047)
2 weeks 1 day ago
A vulnerability classified as critical has been found in Linux Kernel up to 6.6.65/6.12.4. This affects the function request_lock of the component dlm. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-47809. The attack can only be initiated within the local network. No exploit exists.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-56719 | Linux Kernel up to 6.6.67/6.12.6 stmmac_tso_xmit allocation of resources (Nessus ID 231924 / WID-SEC-2025-1439)
2 weeks 1 day ago
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.6.67/6.12.6. The impacted element is the function stmmac_tso_xmit. Performing a manipulation results in allocation of resources.
This vulnerability is known as CVE-2024-56719. Access to the local network is required for this attack. No exploit is available.
You should upgrade the affected component.
vuldb.com
CVE-2024-50298 | Linux Kernel up to 6.6.60/6.11.7 ndo_set_vf_mac null pointer dereference (ef0edfbe9eee/7eb923f8d481/e15c5506dd39 / Nessus ID 213018)
2 weeks 1 day ago
A vulnerability identified as critical has been detected in Linux Kernel up to 6.6.60/6.11.7. The impacted element is the function net_device_ops::ndo_set_vf_mac. Performing a manipulation results in null pointer dereference.
This vulnerability is known as CVE-2024-50298. Access to the local network is required for this attack. No exploit is available.
You should upgrade the affected component.
vuldb.com