Aggregator
CVE-2026-25184 | Microsoft Windows up to Server 2025 Applocker Filter Driver applockerfltr.sys race condition
CVE-2026-23670 | Microsoft Windows up to Server 2025 Virtualization-Based Security untrusted pointer dereference
CVE-2026-23666 | Microsoft .NET Framework prior 4.8.9332.0 exceptional condition
Hackers Are Targeting Critical Infrastructure to Cause Real-World Damage
Critical infrastructure was once considered too complex and isolated to be a primary cyber target. That assumption no longer holds. New reporting from Cyber Security News reveals that the Iran-linked CyberAv3ngers group is actively targeting water utilities, energy systems, and industrial controllers across the United States. What started as symbolic attacks has now evolved into
The post Hackers Are Targeting Critical Infrastructure to Cause Real-World Damage appeared first on Seceon Inc.
The post Hackers Are Targeting Critical Infrastructure to Cause Real-World Damage appeared first on Security Boulevard.
Microsoft Patch Tuesday April 2026 – 168 Vulnerabilities Fixed, Including Actively Exploited 0-day
Microsoft has released its April 2026 Patch Tuesday security update, addressing 168 vulnerabilities across its product portfolio, including one actively exploited zero-day and one publicly disclosed flaw that organizations must prioritize immediately. Zero-Day Under Active Exploitation The most critical issue in this month’s release is CVE-2026-32201, a Microsoft SharePoint Server Spoofing Vulnerability currently being actively […]
The post Microsoft Patch Tuesday April 2026 – 168 Vulnerabilities Fixed, Including Actively Exploited 0-day appeared first on Cyber Security News.
CVE-2026-20930 | Microsoft Windows up to Server 2025 Management Services race condition
CVE-2026-20928 | Microsoft Windows up to Server 2025 Recovery Environment improper removal of sensitive information before storage or transfer
CVE-2026-20806 | Microsoft Windows up to Server 2025 COM Server type confusion
CVE-2026-0390 | Microsoft Windows up to Server 2022 UEFI Secure Boot reliance on untrusted inputs in a security decision
Hackers Are Using GitHub and Jira to Bypass Your Security
The modern enterprise runs on collaboration tools. Platforms like GitHub and Jira are deeply embedded in daily workflows, powering everything from development to project management. But that same trust is now being weaponized. New reporting from Cyber Security News reveals how attackers are exploiting notification systems within these platforms to deliver malicious payloads. Instead of
The post Hackers Are Using GitHub and Jira to Bypass Your Security appeared first on Seceon Inc.
The post Hackers Are Using GitHub and Jira to Bypass Your Security appeared first on Security Boulevard.
Без проприетарных драйверов, прошивок и компромиссов. Вышел Trisquel 12.0 — дистрибутив, одобренный Ричардом Столманом
CVE-2022-20435 | Google Android default permission (A-242248367/U-1901996 / EUVD-2022-25695)
CVE-2022-20435 | Google Android System Service permission (A-242248367 / EUVD-2022-25695)
CVE-2022-20434 | Google Android authorization (A-242244028/U-1882896 / EUVD-2022-25694)
Critical etcd Auth Bypass Flaw Allows Unauthorized Access to Sensitive Cluster APIs
A critical authentication bypass vulnerability has emerged in etcd, the foundational distributed key-value store that supports countless cloud-native systems and Kubernetes clusters globally. Tracked as CVE-2026-33413, this high-severity flaw carries a CVSS score of 8.8. It enables attackers to access highly sensitive cluster APIs without proper authorization. An autonomous artificial intelligence pentesting agent named Strix […]
The post Critical etcd Auth Bypass Flaw Allows Unauthorized Access to Sensitive Cluster APIs appeared first on Cyber Security News.
Chaos
You must login to view this content
Chaos
You must login to view this content
Google 将惩罚“后退按钮劫持”行为
Ivanti Neurons for ITSM Vulnerabilities Allow Remote Attacker to Obtain User Sessions
Ivanti has released security updates addressing two medium-severity vulnerabilities in Ivanti Neurons for ITSM (N-ITSM), its on-premise IT service management platform. The flaws, if exploited, could allow remote authenticated attackers to retain unauthorized access or harvest session data from other users. The company confirmed it is not aware of any active exploitation of either vulnerability […]
The post Ivanti Neurons for ITSM Vulnerabilities Allow Remote Attacker to Obtain User Sessions appeared first on Cyber Security News.