Latest Tweets

Latest Ransomware and Zero Day

The Big Feed

  • Федеральное бюро расследований (ФБР) предупредило пользователей компьютеров о новом способе распространения вирусов через интернет. На это обратило внимание издание PCMag. Специалисты отделения агентства в Денвере, штат Колорадо, рассказали, что злоумышленники начали размещать вирусы на сайтах, созданных якобы для конвертации изображений, видео или других материалов в другой формат. Вирусное программное обеспечение (ПО) могут загрузить на компьютер…

  • A series of remote code execution (RCE) vulnerabilities known as “IngressNightmare” have been discovered in the Ingress NGINX Controller for Kubernetes. These vulnerabilities, identified as CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974, pose a critical threat to Kubernetes clusters, allowing attackers to gain unauthorized access to all cluster secrets and potentially take control of the entire cluster. CVE-2025-24514: auth-url Annotation Injection…

  • Unveiled the Threat Actors

    In this blog, we will discuss some of the famous threat actors and learn about their famous hacks, techniques, and other required details on how they performed those big hacks.First, we have to know about the naming criteria of Threat Actors, how the names of threat actors are decided.Cybersecurity companies always use different names for the same…

  • В России нежелательной признана деятельность финансируемой недружественными странами организации The European Leadership Network. Об этом «Ленте.ру» сообщили в Генпрокуратуре России. Организация создана в 2011 году бывшим британским дипломатом. Ее целями являются разработка и предоставление практических решений проблем в области политики и безопасности. Финансирование идет от НАТО, МИД Великобритании, МИД Финляндии, Фонда имени Генриха Бёлля (признана…

  • Frequently asked questions about five vulnerabilities in the Ingress NGINX Controller for Kubernetes, collectively known as IngressNightmare.BackgroundThe Tenable Security Response Team (SRT) has compiled this blog to answer Frequently Asked Questions (FAQ) regarding IngressNightmare.FAQWhat is IngressNightmare?IngressNightmare is the name given to a series of vulnerabilities in the Ingress NGINX Controller for Kubernetes, an open source…

  • A vulnerability was found in Apple iOS and iPadOS. It has been classified as problematic. Affected is an unknown function of the component Webpage Handler. The manipulation leads to information exposure through discrepancy. This vulnerability is traded as CVE-2024-27830. It is possible to launch the attack remotely. There is no exploit available. It is recommended…

  • A vulnerability, which was classified as problematic, was found in Apple tvOS. This affects an unknown part of the component Message Handler. The manipulation leads to denial of service. This vulnerability is uniquely identified as CVE-2024-27800. It is possible to initiate the attack remotely. There is no exploit available. It is recommended to upgrade the…

  • A vulnerability classified as problematic was found in Apple Safari. This vulnerability affects unknown code of the component Webpage Handler. The manipulation leads to information exposure through discrepancy. This vulnerability was named CVE-2024-27830. The attack can be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component.

  • A vulnerability classified as problematic has been found in Apple watchOS. This affects an unknown part of the component Webpage Handler. The manipulation leads to information exposure through discrepancy. This vulnerability is uniquely identified as CVE-2024-27830. It is possible to initiate the attack remotely. There is no exploit available. It is recommended to upgrade the…

  • A vulnerability was found in Apple visionOS. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Webpage Handler. The manipulation leads to information exposure through discrepancy. This vulnerability is handled as CVE-2024-27830. The attack may be launched remotely. There is no exploit available. It is recommended to…

  • A vulnerability was found in Apple macOS. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Webpage Handler. The manipulation leads to information exposure through discrepancy. This vulnerability is known as CVE-2024-27830. The attack can be launched remotely. There is no exploit available. It is recommended to…

  • A vulnerability was found in Apple macOS and classified as critical. Affected by this issue is some unknown functionality of the component File Handler. The manipulation leads to out-of-bounds read. This vulnerability is handled as CVE-2024-27802. The attack may be launched remotely. There is no exploit available. It is recommended to upgrade the affected component.

  • A vulnerability has been found in Apple iOS and iPadOS and classified as critical. Affected by this vulnerability is an unknown functionality of the component File Handler. The manipulation leads to out-of-bounds read. This vulnerability is known as CVE-2024-27802. The attack can be launched remotely. There is no exploit available. It is recommended to upgrade…

  • A vulnerability, which was classified as problematic, has been found in Apple tvOS. This issue affects some unknown processing of the component Webpage Handler. The manipulation leads to information exposure through discrepancy. The identification of this vulnerability is CVE-2024-27830. The attack may be initiated remotely. There is no exploit available. It is recommended to upgrade…

  • A vulnerability was found in Apple tvOS. It has been declared as critical. This vulnerability affects unknown code of the component File Handler. The manipulation leads to out-of-bounds read. This vulnerability was named CVE-2024-27802. The attack can be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component.

  • A vulnerability was found in Apple visionOS. It has been classified as critical. This affects an unknown part of the component File Handler. The manipulation leads to out-of-bounds read. This vulnerability is uniquely identified as CVE-2024-27802. It is possible to initiate the attack remotely. There is no exploit available. It is recommended to upgrade the…

  • A vulnerability classified as critical was found in Linux Kernel up to 5.15.48/5.18.5. This vulnerability affects the function fsl_mc_bus_remove. The manipulation leads to use after free. This vulnerability was named CVE-2022-49711. Local access is required to approach this attack. There is no exploit available. It is recommended to upgrade the affected component.

  • A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.10.126/5.15.50/5.18.7. This affects the function xdp_redirect. The manipulation leads to use after free. This vulnerability is uniquely identified as CVE-2022-49695. The attack can only be done within the local network. There is no exploit available. It is recommended to upgrade the…

  • A vulnerability was found in Linux Kernel up to 5.15.48/5.18.5. It has been classified as critical. This affects the function lpfc_nlp_get. The manipulation of the argument NLP_EVT_DEVICE_RM leads to use after free. This vulnerability is uniquely identified as CVE-2022-49730. The attack needs to be initiated within the local network. There is no exploit available. It…

  • A vulnerability classified as critical was found in Linux Kernel up to 5.18.9. This vulnerability affects unknown code. The manipulation leads to use after free. This vulnerability was named CVE-2022-49669. Access to the local network is required for this attack to succeed. There is no exploit available. It is recommended to upgrade the affected component.

Post
Filter
Apply Filters