Aggregator
CVE-2025-25430 | TRENDnet TEW-929DRU 1.0.0.10 /cbi_addcert.htm configname cross site scripting
CVE-2025-24316 | Dario Health Dario Application Database and Internet-based Server Infrastructure exposure of sensitive information due to incompatible policies (icsma-25-058-01)
CVE-2025-20049 | Dario Health Dario Application Database and Internet-based Server Infrastructure Portal Service cross site scripting (icsma-25-058-01)
CVE-2025-24849 | Dario Health USB-C Blood Glucose Monitoring System Starter Kit Android Applications cleartext transmission (icsma-25-058-01)
CVE-2025-25428 | TRENDnet TEW-929DRU 1.0.0.10 /etc/shadow hard-coded password
Submit #502649: Hunan Zhonghe Baiyi Information Technology Co., Ltd. Baiyiyun Asset Management and Operations System /wuser/anyUserBoundHouse.php SQL Injection [Accepted]
CVE-2025-1795 | Python CPython up to 3.11.8/3.12.2/3.13.0a4 Address Header information disclosure (Issue 100884)
CVE-2025-25635 | TOTOLINK A3002R 1.1.1-B20200824.0128 /bin/boa formIpv6Setup pppoe_dns1 buffer overflow
CVE-2025-25610 | TOTOLINK A3002R 1.1.1-B20200824.0128 /bin/boa formIpv6Setup static_gw buffer overflow
CVE-2025-27408 | mnfst manifest up to 4.9.0 Password Hash hash without salt (GHSA-h8h6-7752-g28c)
CVE-2025-25609 | TOTOLINK A3002R 1.1.1-B20200824.0128 /bin/boa formIpv6Setup static_ipv6 buffer overflow
A Threat Actor Claims to have Leaked the Data of Division Production Ingénierie Hydraulique (France)
CVE-2025-0160 | IBM Storage Virtualize up to 8.7.2.1 RPCAdapter Service process control
CVE-2025-0159 | IBM Storage Virtualize up to 8.7.2.1 RPCAdapter Endpoint authentication bypass
Microsoft Busts Hackers Selling Illegal Azure AI Access
Mozilla’s Data Practices and Privacy Evolution: Recent Developments
Dive into Mozilla's controversial 2025 privacy changes, including removed 'no data sale' guarantees and Git repository security upgrades. Understand the balance between legal compliance, AI integration, and user trust in Firefox's evolving ecosystem.
The post Mozilla’s Data Practices and Privacy Evolution: Recent Developments appeared first on Security Boulevard.
SLED Cybersecurity Threats in 2025: What You Need to Know to Stay Ahead
While digital transformations have given state, local, and education (SLED) organizations unprecedented operational flexibility, threat actors are looking to exploit their new vulnerabilities. A virtual frontline has formed, and cybersecurity measures must defend against a rising tide of cyber threats. Ransomware attacks, phishing schemes, IoT vulnerabilities, and more make it imperative that SLED organizations’ leadership… Continue reading SLED Cybersecurity Threats in 2025: What You Need to Know to Stay Ahead
The post SLED Cybersecurity Threats in 2025: What You Need to Know to Stay Ahead appeared first on Assura, Inc..
The post SLED Cybersecurity Threats in 2025: What You Need to Know to Stay Ahead appeared first on Security Boulevard.
US Soldier Intends to Admit Hacking 15 Telecom Carriers
CMMC vs FedRAMP: Do They Share Reciprocity?
Throughout this blog, we often write about both FedRAMP and CMMC as cybersecurity frameworks applied to the federal government and its contractors. These frameworks share a lot of the same DNA stemming from the same resources, and they share the same goal of making the federal government more secure. One significant question you may have, […]
The post CMMC vs FedRAMP: Do They Share Reciprocity? appeared first on Security Boulevard.