21Articles
9Categories
2026-02-05Date
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.  CVE-2025-11953 React Native Community CLI OS Command Injection Vulnerability CVE-2026-24423 SmarterTools SmarterMail Missing Authenticatio…
KEV
πŸ›
CVE-2026-24302 Azure Arc Elevation of Privilege Vulnerability
πŸ›
CVE-2026-21532 Azure Function Information Disclosure Vulnerability
πŸ›
CVE-2026-24300 Azure Front Door Elevation of Privilege Vulnerability
πŸ›
CVE-2026-0391 Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
πŸ›
Chromium: CVE-2026-1861 Heap buffer overflow in libvpx
πŸ›
ZDI-26-068: Docker Desktop for Windows Incorrect Permission Assignment Privilege Escalation Vulnerability
πŸ›
ZDI-26-067: Docker Desktop for Windows Incorrect Permission Assignment Privilege Escalation Vulnerability
πŸ›
ZDI-26-066: (Pwn2Own) Lexmark CX532adwe getCFFNames Heap-based Buffer Overflow Remote Code Execution Vulnerability
πŸ›
ZDI-26-065: (Pwn2Own) Lexmark CX532adwe usecmap Type Confusion Remote Code Execution Vulnerability
πŸ›
ZDI-26-064: (Pwn2Own) Lexmark CX532adwe execuserobject Heap-based Buffer Overflow Remote Code Execution Vulnerability
πŸ›
ZDI-26-063: (Pwn2Own) Lexmark CX532adwe libesffls Directory Traversal Remote Code Execution Vulnerability
πŸ›
ZDI-26-062: (Pwn2Own) Lexmark CX532adwe esfhelper Untrusted Search Path Local Privilege Escalation Vulnerability
⚠️
SIEM Rules for detecting exploitation of vulnerabilities in FortiCloud SSO
πŸ“’
CISA Orders Federal Agencies to Strengthen Edge Device Security Amid Rising Cyber Threats
πŸ”₯
Betterment - 1,435,174 breached accounts
πŸ•΅οΈ
The Power of Glean and Prisma AIRS Integration
🌐
2025 Q4 DDoS threat report: A record-setting 31.4 Tbps attack caps a year of massive DDoS assaults
πŸŽ™οΈ
Smashing Security podcast #453: The Epstein Files didn’t hide this hacker very well
πŸ“‘
Incognito Market admin sentenced to 30 years for running $105 million dark web drug empire
πŸ“‘
How to write your first obfuscator of Java Bytecode