Aggregator
CVE-2026-23064 | Linux Kernel up to 6.6.121/6.12.67/6.18.7/6.19-rc6 sched tcf_ife_encode null pointer dereference
CVE-2026-23062 | Linux Kernel up to 6.6.121/6.12.67/6.18.7/6.19-rc6 hp-bioscfg min_length_show null pointer dereference
CVE-2026-23063 | Linux Kernel up to 6.6.121/6.12.67/6.18.7/6.19-rc6 uacce put_queue state issue
CVE-2026-23057 | Linux Kernel up to 6.12.67/6.18.7/6.19-rc6 vsock virtio_vsock_alloc_linear_skb uninitialized pointer
CVE-2026-23055 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 riic suspend_late state issue
ACFW firewall test prologue – still failing at the basics
The results of our soon-to-be-published Advanced Cloud Firewall (ACFW) test are hard to ignore. Some vendors are failing badly at the basics like SQL injection, command injection, Server-Side Request Forgery (SSRF) and API abuse with block percentages under 20%, sometimes way under. Those are just the application-based threats, never mind the vulnerability-based attacks. While it’s […]
The post ACFW firewall test prologue – still failing at the basics appeared first on Security Boulevard.
«Верните деньги, или мы идём в полицию». CrossCurve дала похитителям ровно 72 часа на возврат крипты
[Control Systems] Moxa security advisory (AV26-085)
False Negatives Are a New SOC Headache. Here’s the Fast Way to Fix It
False negatives are becoming the most expensive “quiet” failure in SOCs. In 2026, AI-generated phishing and multi-stage malware chains are built to look clean on the outside, behave normally at first, and only reveal intent after real interaction. The result is brutal for security leaders: real attacks get labeled “benign,” “low risk,” or “no verdict,” and the […]
The post False Negatives Are a New SOC Headache. Here’s the Fast Way to Fix It appeared first on Cyber Security News.
Exclusive: US used cyber weapons to disrupt Iranian air defenses during 2025 strikes
300 вирусов в одном флаконе. OpenClaw стал раем для хакеров и адом для пользователей
Global SystemBC Botnet Found Active Across 10,000 Infected Systems
Significant Ransomware & Firewall Misconfiguration Breach
When “Secure by Design” Fails at the Edge Firewalls are still widely treated as the first and final line of defense. Once deployed, configured, and updated, they are often assumed to be a stable control that quietly does its job in the background. Recent ransomware incidents suggest that the assumption is becoming dangerous. In early
The post Significant Ransomware & Firewall Misconfiguration Breach appeared first on Seceon Inc.
The post Significant Ransomware & Firewall Misconfiguration Breach appeared first on Security Boulevard.
When Documents Become the Attack Vector: Inside APT28’s Latest Microsoft Office Exploit
Email attachments remain one of the most trusted entry points into enterprise environments. Despite years of awareness training and secure email gateways, attackers continue to rely on documents because they blend seamlessly into everyday workflows. New reporting from The Hacker News details how APT28, a Russia-linked threat actor, is actively exploiting a newly disclosed Microsoft
The post When Documents Become the Attack Vector: Inside APT28’s Latest Microsoft Office Exploit appeared first on Seceon Inc.
The post When Documents Become the Attack Vector: Inside APT28’s Latest Microsoft Office Exploit appeared first on Security Boulevard.
Akira
You must login to view this content
Akira
You must login to view this content
Incognito dark web drug market operator gets 30 years in prison
Rui-Siang Lin, a Taiwanese national, was sentenced to 30 years in U.S. federal prison for operating Incognito Market, one of the world’s largest illicit online narcotics marketplaces. Incognito Market splash page and graphical interface Incognito Market operated on the dark web from October 2020 until it closed in March 2024. The platform functioned as a centralized marketplace accessible through the Tor browser and supported drug sales to buyers around the world. Vendors used the site … More →
The post Incognito dark web drug market operator gets 30 years in prison appeared first on Help Net Security.