Aggregator
CVE-2026-40737 | VillaTheme COMPE Plugin up to 1.1.4 on WordPress authorization
CVE-2026-40740 | Themeum Tutor LMS Plugin up to 3.9.7 on WordPress authorization
CVE-2026-40730 | ThemeGrill Demo Importer Plugin up to 2.0.0.6 on WordPress authorization
CVE-2026-40742 | Nelio AB Testing Plugin up to 8.2.8 on WordPress authorization
CVE-2026-40728 | BlockArt Magazine Blocks Plugin up to 1.8.3 on WordPress authorization
CVE-2026-3590 | Mattermost up to 10.11.12/11.3.2/11.4.2/11.5.0 toctou (EUVD-2026-22915)
ShinyHunters Leak Rockstar Games Data, No Player Records Impacted
【安全更新】微软4月安全更新多个产品高危漏洞通告
实战:我如何用AI分析Coruna iOS漏洞利用工具包?
Microsoft: April updates trigger BitLocker key prompts on some servers
Mirax malware campaign hits 220K accounts, enables full remote control
网络安全信息与动态周报2026年第15期(4月6日-4月12日)
微软补丁日安全通告|4月份
【漏洞通告】Axios SSRF漏洞 (CVE-2026-40175)
Hackers Create Hidden Mailbox Rules in Microsoft 365 to Intercept Sensitive Business Emails
Cybercriminals have found a quiet way to sit inside a corporate email account and read everything being sent and received — without the account owner ever knowing. Attackers are now abusing a built-in Microsoft 365 feature called mailbox rules to silently intercept business emails, redirect financial communications, and suppress security notifications, all while staying completely […]
The post Hackers Create Hidden Mailbox Rules in Microsoft 365 to Intercept Sensitive Business Emails appeared first on Cyber Security News.
Забыли обновить роутер? Поздравляем, хакеры используют его для взлома GitHub
Deterministic + Agentic AI: The Architecture Exposure Validation Requires
Chile’s Cybersecurity Framework Law: How SOCs Achieve Compliance and Response Readiness
In Chile, cybersecurity compliance is becoming an operational issue, not just a legal one. Under the new Cybersecurity Framework Law, organizations must show they have real capabilities for threat detection, incident analysis, and response. For many teams, that exposes a serious gap between regulatory expectations and day-to-day security operations. Key Takeaways The Regulatory Shift Chile has […]
The post Chile’s Cybersecurity Framework Law: How SOCs Achieve Compliance and Response Readiness appeared first on ANY.RUN's Cybersecurity Blog.