Aggregator
CVE-2026-6434 | rust-coreutils Temporary File uu_sort information disclosure
CVE-2025-66335 | Apache Doris MCP Server up to 0.6.0 sql injection
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul
Payouts King Rises as New Ransomware Threat Linked to Former BlackBasta Affiliates
A relatively unknown ransomware group called Payouts King has emerged as a serious cybersecurity threat, carrying the torch of the now-defunct BlackBasta operation. Since its appearance in April 2025, the group has quietly carried out targeted attacks while remaining largely under the radar, combining aggressive data theft with selective file encryption. BlackBasta was one of […]
The post Payouts King Rises as New Ransomware Threat Linked to Former BlackBasta Affiliates appeared first on Cyber Security News.
From Analytics to “Interception”: How Website Tracking Became a Wiretap Problem—and What Companies Should Do About It
CISA Warns of Apache ActiveMQ Input Validation Vulnerability Exploited in Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding a critical security defect in Apache ActiveMQ. On April 16, 2026, the agency officially added the vulnerability, tracked as CVE-2026-34197, to its Known Exploited Vulnerabilities (KEV) catalog. Federal agencies and private security teams are now under tight deadlines to patch their systems […]
The post CISA Warns of Apache ActiveMQ Input Validation Vulnerability Exploited in Attacks appeared first on Cyber Security News.
群核黄晓煌:创业者的「命」,归根结底来自「世界观」
群核黄晓煌:创业者的「命」,归根结底来自「世界观」
思科紧急修复高危 ISE 漏洞
思科紧急修复高危 ISE 漏洞
西安电子科技大学 | SLOT:基于图强化学习的溯源图驱动APT检测方法
Vibe Coding vs. SBOM: One Builds Fast. The Other Tells You What You Just Built
Jensen vs. Dwarkesh on China Chips
Хакерам здесь комфортно. Почему популярные хостинги так нравятся авторам вирусов
Leaked Windows Defender 0-Day Vulnerability Actively Exploited in Attacks
An active in-the-wild exploitation of three recently leaked Windows Defender privilege escalation vulnerabilities, with threat actors deploying proof-of-concept exploit code sourced directly from public GitHub repositories against real enterprise targets. On April 2, 2026, a security researcher operating under the alias Nightmare-Eclipse (also known as Chaotic Eclipse) published the BlueHammer exploit on GitHub following a […]
The post Leaked Windows Defender 0-Day Vulnerability Actively Exploited in Attacks appeared first on Cyber Security News.