Aggregator
CVE-2005-3127 | lucidCMS 1.0.11 index.php cross site scripting (EDB-26300 / XFDB-22436)
CVE-2005-3988 | Pineapple Technologies Lore 1.5.4 article.php ID sql injection (EDB-26688 / BID-15665)
Влюбилась в парня по переписке? Поздравляем, ваш кошелек уже пуст
США раскрыли детали тайной операции против BlackSuit: сервера, домены и миллионы под арестом
CVE-2025-43736 | Liferay Portal/DXP Profile Picture allocation of resources (WID-SEC-2025-1766)
Second ransomware attack in two months disrupts South Korean ticketing giant
What are the Biggest Cybersecurity Nightmares Your Business Might Face in 2025?
In 2025, cybersecurity isn’t just IT’s job — it’s a core business survival skill against faster, smarter and more targeted threats.
The post What are the Biggest Cybersecurity Nightmares Your Business Might Face in 2025? appeared first on Security Boulevard.
Trend Micro Launches Agentic SIEM to Herald New Era of Proactive Security
CISA Releases Seven Industrial Control Systems Advisories
CISA released seven Industrial Control Systems (ICS) advisories on August 12, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-224-01 Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, Cobalt Share
- ICSA-25-224-02 Johnson Controls iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2
- ICSA-25-224-03 Schneider Electric EcoStruxure Power Monitoring Expert
- ICSA-25-224-04 AVEVA PI Integrator
- ICSA-24-263-04 MegaSys Computer Technologies Telenium Online Web Application (Update A)
- ICSA-25-191-10 End-of-Train and Head-of-Train Remote Linking Protocol (Update A)
- ICSMA-25-224-01 Santesoft Sante PACS Server
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2013-3893 Microsoft Internet Explorer Resource Management Errors Vulnerability
- CVE-2007-0671 Microsoft Office Excel Remote Code Execution Vulnerability
- CVE-2025-8088 RARLAB WinRAR Path Traversal Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
From Discovery to Testing: Akamai and Snyk Deliver Seamless API Security
ShinyHunters Tactics Now Mirror Scattered Spider
Three Ways to Ensure Regulatory and Legislative Compliance with non-Oracle Java
Many global regulations and legislations have strict requirements around Java application security, incident reporting, and more. Azul has an unmatched set of solutions.
The post Three Ways to Ensure Regulatory and Legislative Compliance with non-Oracle Java appeared first on Azul | Better Java Performance, Superior Java Support.
The post Three Ways to Ensure Regulatory and Legislative Compliance with non-Oracle Java appeared first on Security Boulevard.