Aggregator
Cybercrime group Lapsus$ claims the hack of pharma giant AstraZeneca
CVE-2026-4784 | code-projects Simple Laundry System 1.0 Parameter /checkcheckout.php serviceId sql injection (EUVD-2026-15183)
CVE-2026-28895 | Apple iOS/iPadOS up to 26.3 Stolen Device Protection denial of service (EUVD-2026-15177)
CVE-2026-1166 | Hitachi Ops Center Administrator up to 11.0.7 redirect (hitachi-sec-2026-113 / EUVD-2026-15184)
CVE-2026-2072 | Hitachi Infrastructure Analytics Advisor prior 11.0.5-00 cross site scripting (hitachi-sec-2026-114 / EUVD-2026-15186)
CVE-2026-2343 | PeproDev PeproDev Ultimate Invoice Plugin up to 2.2.5 on WordPress ZIP File Parser information disclosure (EUVD-2026-15188)
CVE-2026-26306 | OM Digital Solutions OM Workspace up to 2.4 Installer uncontrolled search path (EUVD-2026-15190)
CVE-2026-33253 | Sanyo Denki Sanups Software Standalone/Sanups Software Windows Service unquoted search path (EUVD-2026-15192)
CVE-2026-32326 | Sharp Speed Wi-Fi 5G X01 missing authentication (EUVD-2026-15194)
Virtual machines, virtually everywhere – and with real security gaps
Linux pwn 探索篇
Karpathy紧急发声:日下载340万次的LiteLLM被投毒,黑客一个bug意外暴露危机
Polaris-Obfuscator中BogusControlFlow简要分析 反混淆
某智慧校园系统代码审计
睡前敲了一下upgrade,醒来我的“龙虾”废了
Трамп за своих, Брюссель за порядок. Как выбор сериала на вечер стал вопросом мировой геополитики
Operation Henhouse Nets Over 500 Arrests in UK Fraud Crackdown
ClawHub Vulnerability Let Attackers Manipulate Rankings to Become the #1 Skill
Security research team has uncovered a critical vulnerability in ClawHub, the public skills registry for the OpenClaw agentic ecosystem. This flaw allowed attackers to artificially inflate the download counts of malicious skills, thereby bypassing security checks and manipulating search rankings. By pushing a compromised skill to the top, threat actors could orchestrate massive supply-chain attacks […]
The post ClawHub Vulnerability Let Attackers Manipulate Rankings to Become the #1 Skill appeared first on Cyber Security News.
Google Authenticator’s Hidden Passkey Architecture Could Open New Passwordless Attack Paths
Passwordless authentication was supposed to mark the end of account takeovers. Designed to replace traditional passwords with cryptographic keys tied to physical devices, it promised a future where stolen credentials could no longer unlock user accounts. But a close examination of how Google has actually built its passkey ecosystem reveals something far more complex than […]
The post Google Authenticator’s Hidden Passkey Architecture Could Open New Passwordless Attack Paths appeared first on Cyber Security News.