Tag: EN

Weaponized file name flaw makes updating glob an urgent job

PLUS: CISA issues drone warning; China-linked DNS-hijacking malware; Prison for BTC Samourai; And more Infosec In Brief  Researchers have urged users of the glob file pattern matching library to update their installations, after discovery of a years-old remote code execution…

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 72

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter Contagious Interview Actors Now Utilize JSON Storage Services for Malware Delivery RONINGLOADER: DragonBreath’s New Path to PPL Abuse   npm…

Mass Router Hijack Targets End-of-Life ASUS Devices

  The research team has found an extensive cyber-espionage campaign known as Operation WrtHug, which has quietly infiltrated tens of thousands of ASUS routers across the globe, which is a sign that everyday network infrastructure is becoming increasingly vulnerable.  A…

SonicWall flags SSLVPN flaw allowing firewall crashes

SonicWall warns of a high-severity buffer overflow flaw in SonicOS SSLVPN (CVE-2025-40601) that lets attackers crash Gen7 and Gen8 firewalls. A new high-severity SonicOS SSLVPN flaw, tracked as CVE-2025-40601 (CVSS score of 7.5), allows attackers to crash SonicWall Gen7 and…

Wireshark 4.4.1 Released, (Sun, Nov 23rd)

Wireshark release 4.6.1 fixes 2 vulnerabilities and 20 bugs. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Wireshark 4.4.1 Released, (Sun, Nov 23rd)

When AI Goes Rogue, Science Fiction Meets Reality

The new movie Tron: Ares isn’t just sci-fi entertainment — it’s a mirror for today’s AI risks and realities. What happens when artificial intelligence systems don’t work as intended? The post When AI Goes Rogue, Science Fiction Meets Reality appeared…

CodeStepByStep – 17,351 breached accounts

In November 2025, the online coding practice tool CodeStepByStep suffered a data breach that exposed 17k records. The impacted data included names, usernames and email addresses. This article has been indexed from Have I Been Pwned latest breaches Read the…