Aggregator
Cisco и Microsoft невольно помогли преступникам. Как надежные службы стали частью схемы взлома
Russian hackers exploit Zimbra flaw to breach Ukrainian maritime agency
Horabot Banking Trojan Resurfaces in Mexico With Multi-Stage Phishing and Email Worm Tactics
A well-known banking trojan called Horabot has resurfaced in an active campaign targeting users across Mexico, combining a multi-stage infection chain with an email worm that turns every compromised machine into a phishing relay. The threat bundles a Delphi-based banking trojan with a PowerShell-driven spreader, making it one of the more layered financially motivated threats […]
The post Horabot Banking Trojan Resurfaces in Mexico With Multi-Stage Phishing and Email Worm Tactics appeared first on Cyber Security News.
2026首届汽车安全白帽黑客大会圆满收官,共筑车联网安全新生态
Horizon3.ai’s NodeZero®, the World’s Most Experienced AI Hacker, Drives 102% ARR Growth
CVE-2026-28070 | Tips and Tricks HQ WP eMember Plugin up to 10.2.2 on WordPress authorization (EUVD-2026-13049)
CVE-2026-28073 | Tips and Tricks HQ WP eMember Plugin up to 10.2.2 on WordPress cross site scripting (EUVD-2026-13051)
三星电子计划在2026年投资超过730亿美元
CVE-2026-23242 | Linux Kernel up to 6.19.3 RDMA siw_get_hdr null pointer dereference (EUVD-2026-12801 / Nessus ID 302913)
CVE-2025-61043 | Monkey Audio 11.31 GetUTF16FromUTF8 out-of-bounds (Nessus ID 302919)
Корпорации против «разводил». Технологические гиганты создали «общий чат» для поимки кибермошенников
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2026-20131 Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability
This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
NIST Submits Annual Report to Congress Summarizing FY 2025 Progress on National Construction Safety Team Investigations
How to secure your online meetings
CVE-2026-1767 | GNOME localsearch MP3 Extractor heap-based overflow
CVE-2026-1766 | GNOME localsearch ID3v2.3 COMM Tag heap-based overflow
CVE-2026-1765 | GNOME localsearch TXXX Tag heap-based overflow
CVE-2026-1764 | GNOME localsearch MP3 Extractor heap-based overflow
Secure endpoint management systems immediately, CISA urges
The US Cybersecurity and Infrastructure Security Agency (CISA) warns that the cyberattack on Stryker Corporation serves as a signal to U.S. organizations that foreign cyber activity tied to Middle East conflicts may be spilling into their operations. Attackers breached Stryker’s internal Microsoft environment and reportedly wiped 200,000 systems, servers, and mobile devices, while extracting 50 terabytes of data. To defend against similar malicious activity involving the misuse of legitimate endpoint management software, CISA urges organizations … More →
The post Secure endpoint management systems immediately, CISA urges appeared first on Help Net Security.