Aggregator
CVE-2025-13086 | OpenVPN up to 2.7_rc1 Source IP Address verification of source (EUVD-2025-201102 / Nessus ID 277384)
CVE-2025-13751 | OpenVPN up to 2.7_rc2 on Windows Interactive Service Agent allocation of resources (EUVD-2025-200999)
New Amaranth Dragon cyberespionage group exploits WinRAR flaw
From Insight to Impact: Observability Fuels AI-Driven Innovation
AI Drives Doubling of Phishing Attacks in a Year
Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia
Key Points Introduction Check Point Research has identified several campaigns targeting multiple countries in the Southeast Asian region. These related activities have been collectively categorized under the codename “Amaranth-Dragon”. The campaigns demonstrate a clear focus on government entities across the region, suggesting a motivated threat actor with a strong interest in geopolitical intelligence. The campaigns […]
The post Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia appeared first on Check Point Research.
Android security advisory – February 2026 monthly rollup (AV26-082)
CVE-2023-43278 | SeaCMS up to 12.8 admin_manager.php cross-site request forgery (EUVD-2023-47697)
CVE-2023-43270 | dst-admin 1.5.0 /home/playerOperate userId code injection (EUVD-2023-47689)
CVE-2023-43271 | 70mai a500s up to 1.2.119 Recording access control (EUVD-2023-47690)
CVE-2023-43275 | DedeCMS 5.7 Backend Management Interface /catalog_add.php cross-site request forgery (EUVD-2023-47694)
CVE-2023-43274 | PHP Jabbers PHP Shopping Cart 4.2 ID sql injection (EUVD-2023-47693)
Google Chrome security advisory (AV26-081)
LibreOffice 26.2 释出
Why Moltbook Changes the Enterprise Security Conversation
For several years, enterprise security teams have concentrated on a well-established range of risks, including users clicking potentially harmful links, employees uploading data to SaaS applications, developers inadvertently disclosing credentials on platforms like GitHub, and chatbots revealing sensitive information. However, a notable shift is emerging—one that operates independently of user actions. Artificial intelligence agents are...
The post Why Moltbook Changes the Enterprise Security Conversation appeared first on Aryaka.
The post Why Moltbook Changes the Enterprise Security Conversation appeared first on Security Boulevard.