Aggregator
CVE-2025-51823 | libcsp 2.0 csp_eth_init ifname buffer overflow (Issue 850)
CVE-2018-1002008 | Arigato Autoresponder/Newsletter 2.5.1.8 on WordPress list-user.html.php offset Reflected cross site scripting (EDB-45434)
[Control systems] ABB security advisory (AV25-498)
Суд против Microsoft: компанию обвиняют в цифровом рэкете и принуждении к покупкам
CVE-2022-43651 | Bentley View SKP File Parser use after free
CVE-2022-43652 | Bentley View SKP File Parser use after free
CVE-2024-37507 | Themewinter Eventin Plugin up to 3.3.57 on WordPress cross site scripting
CVE-2024-39648 | Themewinter Eventin Plugin up to 4.0.5 on WordPress cross site scripting
CastleLoader Malware Infected Over 400+ Devices Using Cloudflare-Themed ClickFix Phishing Attack
CastleLoader, a sophisticated malware loader that emerged in early 2025, has successfully compromised 469 devices out of 1,634 infection attempts since May 2025, achieving an alarming 28.7% infection rate. This versatile threat has primarily targeted U.S. government entities through advanced phishing campaigns that exploit user trust in legitimate platforms and services. The malware employs two […]
The post CastleLoader Malware Infected Over 400+ Devices Using Cloudflare-Themed ClickFix Phishing Attack appeared first on Cyber Security News.
Netherlands: Citrix Netscaler flaw CVE-2025-6543 exploited to breach orgs
CVE-2022-22721 | Apache HTTP Server up to 2.4.52 Request Body integer overflow (Nessus ID 247826)
CVE-2022-22719 | Apache HTTP Server up to 2.4.52 Request Body initialization (Nessus ID 247826)
CVE-2022-22719 | Apple macOS up to 12.3 Apache initialization (HT213257 / Nessus ID 247826)
CVE-2020-35452 | Apache HTTP Server up to 2.4.46 mod_auth_digest stack-based overflow (Nessus ID 247826)
CVE-2021-26690 | Apache HTTP Server up to 2.4.46 mod_session null pointer dereference (Nessus ID 247826)
CVE-2025-47171 | Microsoft Outlook input validation (EUVD-2025-17728 / EDB-52356)
How DataDome Blocked 214M+ Malicious Requests With Server-Side Behavioral Detection
DataDome’s server-side behavioral detection blocked over 214 million malicious requests from a single IP targeting a global travel platform without downtime or disruption.
The post How DataDome Blocked 214M+ Malicious Requests With Server-Side Behavioral Detection appeared first on Security Boulevard.
WHY2025 CTF
Date: Aug. 8, 2025, 4 p.m. — 11 Aug. 2025, 16:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://ctf.why2025.org/
Rating weight: 0.00
Event organizers: Eindbazen
BSidesSF 2025: Netsec Is Dead(?): Modern Network Fingerprinting For Real-World Defense
Creator/Author/Presenter: Vlad Iliushin
Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon - certainly a venue like no other; and via the organization's YouTube channel.
Additionally, the organization is welcoming volunteers for the BSidesSF Volunteer Force, as well as their Program Team & Operations roles. See their succinct BSidesSF 'Work With Us' page, in which, the appropriate information is to be had!
The post BSidesSF 2025: Netsec Is Dead(?): Modern Network Fingerprinting For Real-World Defense appeared first on Security Boulevard.