Threat actors are abusing Claude artifacts and Google Ads in ClickFix campaigns that deliver infostealer malware to macOS users searching for specific queries. [...]
A vulnerability was found in Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0. It has been declared as critical. This vulnerability affects the function ieee80211_tdls_oper of the component wifi. Executing a manipulation can lead to uninitialized pointer.
This vulnerability is tracked as CVE-2025-38644. The attack is only possible within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.16.0. It has been classified as critical. Impacted is an unknown function of the component Bluetooth. The manipulation leads to null pointer dereference.
This vulnerability is referenced as CVE-2025-38641. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.15.9/6.16.0. This impacts an unknown function. Performing a manipulation results in reachable assertion.
This vulnerability is cataloged as CVE-2025-38642. The attack must originate from the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.15.9/6.16.0. It has been rated as critical. This issue affects the function cfg80211_check_and_end_cac of the file net/wireless/chan.c of the component wifi. The manipulation leads to state issue.
This vulnerability is listed as CVE-2025-38643. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.1.147/6.6.101/6.12.41/6.15.9/6.16.0. This affects the function nfnl_acct_find_get in the library lib/vsprintf.c of the component netfilter. Such manipulation leads to out-of-bounds read.
This vulnerability is listed as CVE-2025-38639. The attack must be carried out from within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.6.101/6.12.41/6.15.9/6.16.0. Affected by this vulnerability is the function nf_hook_run_bpf in the library /include/linux/filter.h. The manipulation results in reachable assertion.
This vulnerability is known as CVE-2025-38640. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.16.0. It has been declared as problematic. Affected by this vulnerability is the function net6_rt_notify of the file net/ipv6/route.c. Such manipulation leads to privilege escalation.
This vulnerability is listed as CVE-2025-38638. The attack must be carried out from within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 5.15.107/6.1.23/6.2.10. This vulnerability affects the function i915_perf_add_config_ioctl. Such manipulation leads to use after free.
This vulnerability is traded as CVE-2023-54202. Access to the local network is required for this attack to succeed. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.3.3. This affects the function netlink_recvmsg of the component netlink. This manipulation causes privilege escalation.
This vulnerability is registered as CVE-2023-53853. The attack requires access to the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.2.4. Impacted is the function tty_driver_lookup_tty of the component tty. Executing a manipulation can lead to null pointer dereference.
This vulnerability is handled as CVE-2023-54198. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in code-projects Blood Bank 1.0. It has been declared as problematic. Affected is an unknown function of the file index.php. Such manipulation of the argument msg leads to cross site scripting.
This vulnerability is referenced as CVE-2023-46015. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in code-projects Blood Bank 1.0. It has been rated as problematic. Affected by this vulnerability is an unknown functionality of the file abs.php. Performing a manipulation of the argument Search results in cross site scripting.
This vulnerability is identified as CVE-2023-46016. The attack can be initiated remotely. There is not any exploit available.
A vulnerability labeled as critical has been found in code-projects Blood Bank 1.0. This vulnerability affects unknown code of the file receiverLogin.php. The manipulation of the argument rpassword results in sql injection.
This vulnerability is cataloged as CVE-2023-46017. The attack must originate from the local network. There is no exploit available.
A vulnerability, which was classified as critical, was found in code-projects Blood Bank 1.0. The affected element is an unknown function of the file hospitalLogin.php. Executing a manipulation of the argument hemail/hpassword can lead to sql injection.
This vulnerability is handled as CVE-2023-46014. The attack can only be done within the local network. There is not any exploit available.
Four Principles Positioning the Nuclear Ecosystem for Long-Term Cyber Resilience OT weaknesses are compounding across utilities, with 22% of critical infrastructure firms reporting OT incidents and external access driving half of breaches. U.K. NCSC's new guidance outlines connectivity principles that utilities can embed to avoid costly retrofits and compliance issues.
Futurex's Ruchin Kumar on CBDC Adoption and HSM Security for Transactions CBDCs are expanding, with 90% of central banks exploring them. India's e-rupee pilot shows strong adoption, backed by RBI standards and HSM-secure transactions. Ruchin Kumar, VP for South Asia at Futurex, underscores awareness, interoperability and encryption as keys to CBDC success and PQC readiness.
Develop 'Strong Resilience and Recovery Plans,' Urges UK Cybersecurity Agency Following Poland's energy grid being targeted by Russian nation-state attackers, Britain has issued a "severe cyberthreat" alert to its domestic critical national infrastructure operators, urging them to refine their defensive and resilience posture ahead of any unexpected escalation in targeting.
China, Iran, North Korea Hackers Exploit Gemini Across Attack Life Cycle State-backed hackers weaponized Google's artificial intelligence model Gemini to accelerate cyberattacks, using the productivity tool as an offensive asset for reconnaissance, social engineering and malware development. Google said it has disabled accounts and strengthened defenses.