44Articles
5Categories
2026-01-02Date
πŸ›
Apache NuttX Flaw Allows Attackers to Crash Embedded Systems
πŸ›
GNU Wget2 Vulnerability Enables Remote File Overwrite Attacks
πŸ›
CISA Issues Warning on WHILL Model C2 Wheelchair Takeover Vulnerabilities
πŸ›
CVE-2024-3177 Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin
πŸ›
CVE-2024-30896 InfluxDB OSS 2.x through 2.7.11 stores the administrative operator token under the default organization which allows authorized users with read access to the authorization resource of the default organization to retrieve the operator token. InfluxDB OSS 1.x, Enterprise, Cloud, Cloud Dedicated and Clustered are not affected. NOTE: The researcher states that InfluxDB allows allAccess administrators to retrieve all raw tokens via an "influx auth ls" command. The supplier indicates that the organizations feature is operating as intended and that users may choose to add users to non-default organizations. A future release of InfluxDB 2.x will remove the ability to retrieve tokens from the API.
πŸ›
CVE-2025-6270 HDF5 H5FSsection.c H5FS__sect_find_node heap-based overflow
πŸ›
CVE-2024-56738 GNU GRUB (aka GRUB2) through 2.12 does not use a constant-time algorithm for grub_crypto_memcmp and thus allows side-channel attacks.
⚠️
Wie KI die Cybersicherheit neu gestaltet
⚠️
Cybersecurity skills matter more than headcount in the AI era
⚠️
Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
⚠️
RondoDox Botnet Exploiting React2Shell Vulnerability
⚠️
Two cybersecurity experts plead guilty to running ransomware operation
KEV
⚠️
Google Tasks Feature Exploited in New Sophisticated Phishing Campaign
⚠️
RondoDoX Botnet Abuses React2Shell Vulnerability for Malware Deployment
⚠️
RondoDox botnet exploits React2Shell flaw to breach Next.js servers
⚠️
The Kimwolf Botnet is Stalking Your Local Network
⚠️
Critical vulnerability in IBM API Connect could allow authentication bypass | CSO Online
⚠️
Over 10K Fortinet firewalls exposed to actively exploited 2FA bypass
KEV
⚠️
Defending the Boundaryless Cloud: Understanding Threats That Matter - SWN #543
πŸ”₯
Covenant Health Data Breach Impacts 478,000 Individuals
πŸ”₯
Two US Cybersecurity Pros Plead Guilty Over Ransomware Attacks
KEV
πŸ”₯
The ROI Problem in Attack Surface Management
πŸ”₯
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
πŸ”₯
Handala Hackers Breach Telegram Accounts Linked to Israeli Officials
πŸ”₯
Hacker Group Claims Responsibility for Alleged Tokyo FM Broadcasting Breach
πŸ”₯
Cognizant Faces Multiple US Class-Action Lawsuits After TriZetto Data Breach
πŸ”₯
Cryptocurrency theft attacks traced to 2022 LastPass breach
πŸ”₯
Covenant Health says May data breach impacted nearly 478,000 patients
πŸ•΅οΈ
Careto Hacker Group Resurfaces After a Decade, Unleashing New Attack Techniques
πŸ•΅οΈ
The Attacks That Defined 2025
πŸ•΅οΈ
Adobe ColdFusion Servers Targeted in Coordinated Campaign
πŸ•΅οΈ
Flock Exposes Its AI-Enabled Surveillance Cameras
πŸ•΅οΈ
Cardano Users Warned of Possible Phishing Attempt Posing as β€˜Eternl Desktop’ Update
πŸ•΅οΈ
Threat Actors Test a Highly Obfuscated, Modified Variant of the Shai Hulud Malware
πŸ•΅οΈ
Just a moment...
πŸ•΅οΈ
Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack
πŸ•΅οΈ
Popular extensions caught poaching user chats with AI | Cybernews
πŸ•΅οΈ
Cybersecurity Skills Gap: Myth?
πŸ•΅οΈ
Hackers drain $3.9M from Unleash Protocol after multisig hijack
πŸ•΅οΈ
Friday Squid Blogging: Squid Found in Light Fixture
πŸ•΅οΈ
AI's Data Security Challenge
πŸ“‘
Trust Wallet links $8.5 million crypto theft to Shai-Hulud NPM attack
πŸ“‘
Google is testing a new image AI and it's going to be its fastest model
πŸ“‘
Debugging DNS response times with tshark, (Fri, Jan 2nd)