Aggregator
CVE-2026-23256 | Linux Kernel up to 6.18.9 net setup_nic_devices initialization (WID-SEC-2026-0790)
CVE-2026-23259 | Linux Kernel up to 6.18.9 io_uring io_req_rw_cleanup allocation of resources (WID-SEC-2026-0790)
CVE-2026-23258 | Linux Kernel up to 6.18.9 liquidio setup_nic_devices memory leak (WID-SEC-2026-0790)
CVE-2026-23257 | Linux Kernel up to 6.18.9 liquidio setup_nic_devices initialization (WID-SEC-2026-0790)
CVE-2026-23260 | Linux Kernel up to 6.6.123/6.12.69/6.18.9 regmap mas_store_gfp allocation of resources (WID-SEC-2026-0790)
CVE-2026-23262 | Linux Kernel up to 6.18.9 gve memory corruption (WID-SEC-2026-0790)
CVE-2026-23263 | Linux Kernel up to 6.18.9 zcrx io_uring denial of service (EUVD-2026-12900 / Nessus ID 303168)
Critics call FCC router rule a ‘big swing’ that could create more supply chain uncertainty
The choice to ban all foreign-made routers instead of targeting known risks could create legal and supply chain disruptions with unclear national security returns.
The post Critics call FCC router rule a ‘big swing’ that could create more supply chain uncertainty appeared first on CyberScoop.
Effective API Security Testing Strategies for Modern Application Environments
Modern apps no longer have well-defined boundaries. In today’s SaaS ecosystem of cloud-native applications and hybrid setups, a mix of internal and third-party APIs often serve as the primary pipelines through which apps access information. Almost all transactions, whether authentication, data transfer or workflow automation, happen through APIs, which centralize access to business-critical data. The..
The post Effective API Security Testing Strategies for Modern Application Environments appeared first on Security Boulevard.
«Ты — эксперт» больше не работает. Оказывается, нейросети от этого только тупеют
Firefox now has a free built-in VPN with 50GB monthly data limit
Tycoon2FA Operators Resume Cloud Account Phishing After Infrastructure Disruption
Cybercriminals behind Tycoon2FA, a phishing-as-a-service (PhaaS) platform, have resumed targeting cloud accounts with near-full force despite a coordinated law enforcement takedown on March 4, 2026. Europol, working alongside authorities from six countries, seized 330 domains that formed the backbone of the platform’s infrastructure in what became one of the more visible efforts to disrupt a […]
The post Tycoon2FA Operators Resume Cloud Account Phishing After Infrastructure Disruption appeared first on Cyber Security News.
Alleged Full Infrastructure Compromise of National Oil Ethiopia With 800GB ERP Database Exfiltration, Veeam and Kaspersky Compromise, and Ransomware Deployment
CanisterWorm Gets Destructive as TeamPCP Deploys Iran-Focused Kubernetes Wiper
A threat actor known as TeamPCP has taken a sharp turn toward destruction with a new payload that goes far beyond credential theft or backdoor installation. The group, tracked as a cloud-native attacker since late 2025, has deployed a Kubernetes wiper that specifically targets systems configured for Iran — a geopolitical targeting tactic that marks […]
The post CanisterWorm Gets Destructive as TeamPCP Deploys Iran-Focused Kubernetes Wiper appeared first on Cyber Security News.
Слишком быстро для обычных смертных. Microsoft запретила «разгонять» SSD-диски в Windows 11
Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR
Threat Actors Continuously Attacking MS-SQL Servers to Deploy ICE Cloud Scanner
A persistent threat actor known as Larva-26002 has been continuously targeting poorly managed Microsoft SQL (MS-SQL) servers, this time deploying a new scanner malware called ICE Cloud Client. The campaign has been active since at least January 2024 and continues into 2026, with the attacker upgrading their tools with every cycle. What started as a […]
The post Threat Actors Continuously Attacking MS-SQL Servers to Deploy ICE Cloud Scanner appeared first on Cyber Security News.