All Articles

Ordered by Date Published : Year: "2025" Month: "09" Day: "08" Hour: "22"
Page: 1 (of 0)

Total Articles in this collection: 44

Navigation Help at the bottom of the page
Article: 18 Popular Code Packages Hacked, Rigged to Steal Crypto - published about 2 months ago.
Content: At least 18 popular JavaScript code packages that are collectively downloaded more than two billion times each week were briefly compromised with malicious software today, after a developer involved in maintaining the projects was phished. The attack appears to have been quickly contained and was narrowly focused on stealing cryptocurrency. But experts warn ...
https://krebsonsecurity.com/2025/09/18-popular-code-packages-hacked-rigged-to-steal-crypto/   
Published: 2025 09 08 22:53:41
Received: 2025 09 09 21:37:15
Feed: Krebs on Security
Source: Krebs on Security
Category: Cyber Security
Topic: Cyber Security
Article: 18 Popular Code Packages Hacked, Rigged to Steal Crypto - published about 2 months ago.
Content: At least 18 popular JavaScript code packages that are collectively downloaded more than two billion times each week were briefly compromised with malicious software today, after a developer involved in maintaining the projects was phished. The attack appears to have been quickly contained and was narrowly focused on stealing cryptocurrency. But experts warn ...
https://krebsonsecurity.com/2025/09/18-popular-code-packages-hacked-rigged-to-steal-crypto/   
Published: 2025 09 08 22:53:41
Received: 2025 09 09 21:37:15
Feed: Krebs on Security
Source: Krebs on Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Cyberattack on Jaguar Land Rover threatens to hit British economic growth - published about 2 months ago.
Content: ... in the British government introducing cybersecurity regulations that would require businesses to better protect themselves from attacks.
https://therecord.media/cyberattack-jaguar-land-rover-economic-growth-uk-government   
Published: 2025 09 08 22:39:54
Received: 2025 09 08 23:01:46
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cyberattack on Jaguar Land Rover threatens to hit British economic growth - published about 2 months ago.
Content: ... in the British government introducing cybersecurity regulations that would require businesses to better protect themselves from attacks.
https://therecord.media/cyberattack-jaguar-land-rover-economic-growth-uk-government   
Published: 2025 09 08 22:39:54
Received: 2025 09 08 23:01:46
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Defense in depth -- the Microsoft way (part 92): more stupid blunders of Windows' File Explorer - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/36   
Published: 2025 09 08 22:33:41
Received: 2025 09 09 01:14:23
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Defense in depth -- the Microsoft way (part 92): more stupid blunders of Windows' File Explorer - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/36   
Published: 2025 09 08 22:33:41
Received: 2025 09 09 01:14:23
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Critical Security Report – Remote Code Execution via Persistent Discord WebRTC Automation - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/35   
Published: 2025 09 08 22:33:26
Received: 2025 09 09 01:14:23
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Critical Security Report – Remote Code Execution via Persistent Discord WebRTC Automation - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/35   
Published: 2025 09 08 22:33:26
Received: 2025 09 09 01:14:23
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: Submission of Critical Firmware Parameters – PCIe HCA Cards - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/34   
Published: 2025 09 08 22:33:25
Received: 2025 09 09 00:54:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Submission of Critical Firmware Parameters – PCIe HCA Cards - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/34   
Published: 2025 09 08 22:33:25
Received: 2025 09 09 00:54:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: SEC Consult SA-20250908-0 :: NFC Card Vulnerability Exploitation Leading to Free Top-Up in KioSoft "Stored Value" Unattended Payment Solution (Mifare) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/33   
Published: 2025 09 08 22:33:16
Received: 2025 09 09 00:54:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: SEC Consult SA-20250908-0 :: NFC Card Vulnerability Exploitation Leading to Free Top-Up in KioSoft "Stored Value" Unattended Payment Solution (Mifare) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/33   
Published: 2025 09 08 22:33:16
Received: 2025 09 09 00:54:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: FFmpeg 7.0+ Integer Overflow in FFmpeg cache: Protocol (CacheEntry::size) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/32   
Published: 2025 09 08 22:28:37
Received: 2025 09 09 00:54:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: FFmpeg 7.0+ Integer Overflow in FFmpeg cache: Protocol (CacheEntry::size) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/32   
Published: 2025 09 08 22:28:37
Received: 2025 09 09 00:54:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: FFmpeg 7.0+ Integer Overflow in DSCP Option Handling of FFmpeg UDP Protocol - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/31   
Published: 2025 09 08 22:28:36
Received: 2025 09 09 00:34:00
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: FFmpeg 7.0+ Integer Overflow in DSCP Option Handling of FFmpeg UDP Protocol - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/31   
Published: 2025 09 08 22:28:36
Received: 2025 09 09 00:34:00
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Cybersecurity as superpower – NordVPN partners with Marvel on a new digital comic - published about 2 months ago.
Content: NordVPN and Marvel Superheroes have joined forces to show the world the superpower of cybersecurity. Thanks to this one-of-a-kind partnership, NordVPN ...
https://www.techradar.com/vpn/vpn-services/cybersecurity-as-superpower-nordvpn-partners-with-marvel-on-a-new-digital-comic   
Published: 2025 09 08 22:28:35
Received: 2025 09 08 23:01:46
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity as superpower – NordVPN partners with Marvel on a new digital comic - published about 2 months ago.
Content: NordVPN and Marvel Superheroes have joined forces to show the world the superpower of cybersecurity. Thanks to this one-of-a-kind partnership, NordVPN ...
https://www.techradar.com/vpn/vpn-services/cybersecurity-as-superpower-nordvpn-partners-with-marvel-on-a-new-digital-comic   
Published: 2025 09 08 22:28:35
Received: 2025 09 08 23:01:46
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: FFmpeg 7.0+ Integer Overflow in UDP Protocol Handler (fifo_size option) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/30   
Published: 2025 09 08 22:28:34
Received: 2025 09 09 00:34:00
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: FFmpeg 7.0+ Integer Overflow in UDP Protocol Handler (fifo_size option) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/30   
Published: 2025 09 08 22:28:34
Received: 2025 09 09 00:34:00
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Article: FFmpeg 7.0+ LADSPA Filter Arbitrary Shared Object Loading via Unsanitized Environment Variables - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/29   
Published: 2025 09 08 22:28:33
Received: 2025 09 09 00:34:00
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: FFmpeg 7.0+ LADSPA Filter Arbitrary Shared Object Loading via Unsanitized Environment Variables - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/29   
Published: 2025 09 08 22:28:33
Received: 2025 09 09 00:34:00
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: FFmpeg 7.0+ NULL Pointer Dereference in FFmpeg String Handling (avstring.c) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/28   
Published: 2025 09 08 22:28:31
Received: 2025 09 09 00:34:00
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: FFmpeg 7.0+ NULL Pointer Dereference in FFmpeg String Handling (avstring.c) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/28   
Published: 2025 09 08 22:28:31
Received: 2025 09 09 00:34:00
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: FFmpeg 7.0+ Type Confusion in FFmpeg Function Pointer Calls (libavformat/utils.c) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/27   
Published: 2025 09 08 22:28:30
Received: 2025 09 09 00:34:01
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: FFmpeg 7.0+ Type Confusion in FFmpeg Function Pointer Calls (libavformat/utils.c) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/27   
Published: 2025 09 08 22:28:30
Received: 2025 09 09 00:34:01
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: FFmpeg 7.0+ Integer Overflow in FFmpeg yuvcmp Tool Leads to Out-of-Bounds Allocation - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/26   
Published: 2025 09 08 22:28:29
Received: 2025 09 09 00:34:01
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: FFmpeg 7.0+ Integer Overflow in FFmpeg yuvcmp Tool Leads to Out-of-Bounds Allocation - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/26   
Published: 2025 09 08 22:28:29
Received: 2025 09 09 00:34:01
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: FFmpeg 7.0+ Heap Use-After-Free in FFmpeg HLS Demuxer (libavformat/utils.c) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/25   
Published: 2025 09 08 22:28:27
Received: 2025 09 09 00:13:49
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: FFmpeg 7.0+ Heap Use-After-Free in FFmpeg HLS Demuxer (libavformat/utils.c) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/25   
Published: 2025 09 08 22:28:27
Received: 2025 09 09 00:13:49
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: DjVuLibre 3.5.29 ZPCodec Unsigned Integer Overflow in Arithmetic Encoding - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/24   
Published: 2025 09 08 22:28:26
Received: 2025 09 09 00:13:49
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: DjVuLibre 3.5.29 ZPCodec Unsigned Integer Overflow in Arithmetic Encoding - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/24   
Published: 2025 09 08 22:28:26
Received: 2025 09 09 00:13:49
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: DjVuLibre 3.5.29 IW44EncodeCodec Integer Overflow (Negative Left Shift in IW44Image::Map::Encode) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/23   
Published: 2025 09 08 22:28:24
Received: 2025 09 09 00:13:49
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: DjVuLibre 3.5.29 IW44EncodeCodec Integer Overflow (Negative Left Shift in IW44Image::Map::Encode) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/23   
Published: 2025 09 08 22:28:24
Received: 2025 09 09 00:13:49
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: libheif v1.21.0 Integer Overflow in Y4M Loader leading to Uncontrolled Memory Allocation - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/22   
Published: 2025 09 08 22:28:23
Received: 2025 09 08 23:54:03
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: libheif v1.21.0 Integer Overflow in Y4M Loader leading to Uncontrolled Memory Allocation - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/22   
Published: 2025 09 08 22:28:23
Received: 2025 09 08 23:54:03
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: libheif v1.21.0 Null Pointer Dereference in std::vector<unsigned>::empty - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/21   
Published: 2025 09 08 22:28:21
Received: 2025 09 08 23:54:03
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: libheif v1.21.0 Null Pointer Dereference in std::vector<unsigned>::empty - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/21   
Published: 2025 09 08 22:28:21
Received: 2025 09 08 23:54:03
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: libheif v1.21.0 Null Pointer Dereference in Box_hdlr::get_handler_type - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/20   
Published: 2025 09 08 22:28:20
Received: 2025 09 08 23:54:04
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: libheif v1.21.0 Null Pointer Dereference in Box_hdlr::get_handler_type - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/20   
Published: 2025 09 08 22:28:20
Received: 2025 09 08 23:54:04
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: libheif v1.21.0 Out-of-Bounds Read in FullBox::get_flags - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/19   
Published: 2025 09 08 22:28:18
Received: 2025 09 08 23:54:04
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: libheif v1.21.0 Out-of-Bounds Read in FullBox::get_flags - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/19   
Published: 2025 09 08 22:28:18
Received: 2025 09 08 23:54:04
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: libheif v1.21.0 Out-of-Bounds Read in Box_stts::get_sample_duration - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/18   
Published: 2025 09 08 22:28:17
Received: 2025 09 08 23:34:46
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: libheif v1.21.0 Out-of-Bounds Read in Box_stts::get_sample_duration - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/18   
Published: 2025 09 08 22:28:17
Received: 2025 09 08 23:34:46
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: libheif 1.21.0 Use-After-Free / Dangling shared_ptr in Track Chunk Handling - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/17   
Published: 2025 09 08 22:28:15
Received: 2025 09 08 23:34:46
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: libheif 1.21.0 Use-After-Free / Dangling shared_ptr in Track Chunk Handling - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/17   
Published: 2025 09 08 22:28:15
Received: 2025 09 08 23:34:46
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: libheif v1.21.0 Heap Buffer Overflow in Chunk::Chunk - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/16   
Published: 2025 09 08 22:28:14
Received: 2025 09 08 23:34:46
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: libheif v1.21.0 Heap Buffer Overflow in Chunk::Chunk - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/16   
Published: 2025 09 08 22:28:14
Received: 2025 09 08 23:34:46
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2024-45438 - SpamTitan Unauthenticated User Creation - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/15   
Published: 2025 09 08 22:27:37
Received: 2025 09 08 23:34:46
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2024-45438 - SpamTitan Unauthenticated User Creation - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/15   
Published: 2025 09 08 22:27:37
Received: 2025 09 08 23:34:46
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: APPLE-SA-08-20-2025-5 macOS Ventura 13.7.8 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/14   
Published: 2025 09 08 22:27:23
Received: 2025 09 08 23:34:46
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: APPLE-SA-08-20-2025-5 macOS Ventura 13.7.8 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/14   
Published: 2025 09 08 22:27:23
Received: 2025 09 08 23:34:46
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: APPLE-SA-08-20-2025-4 macOS Sonoma 14.7.8 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/13   
Published: 2025 09 08 22:27:21
Received: 2025 09 08 23:14:24
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: APPLE-SA-08-20-2025-4 macOS Sonoma 14.7.8 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/13   
Published: 2025 09 08 22:27:21
Received: 2025 09 08 23:14:24
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: APPLE-SA-08-20-2025-3 macOS Sequoia 15.6.1 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/12   
Published: 2025 09 08 22:27:19
Received: 2025 09 08 23:14:24
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: APPLE-SA-08-20-2025-3 macOS Sequoia 15.6.1 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/12   
Published: 2025 09 08 22:27:19
Received: 2025 09 08 23:14:24
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: APPLE-SA-08-20-2025-2 iPadOS 17.7.10 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/11   
Published: 2025 09 08 22:27:18
Received: 2025 09 08 23:14:24
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: APPLE-SA-08-20-2025-2 iPadOS 17.7.10 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/11   
Published: 2025 09 08 22:27:18
Received: 2025 09 08 23:14:24
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: APPLE-SA-08-20-2025-1 iOS 18.6.2 and iPadOS 18.6.2 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/10   
Published: 2025 09 08 22:27:16
Received: 2025 09 08 22:34:08
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: APPLE-SA-08-20-2025-1 iOS 18.6.2 and iPadOS 18.6.2 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/10   
Published: 2025 09 08 22:27:16
Received: 2025 09 08 22:34:08
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: CSV Injection - silverstripecmsv6.0.0 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/9   
Published: 2025 09 08 22:27:12
Received: 2025 09 08 22:34:08
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: CSV Injection - silverstripecmsv6.0.0 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/9   
Published: 2025 09 08 22:27:12
Received: 2025 09 08 22:34:08
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Host Header Injection - silverstripecmsv6.0.0 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/8   
Published: 2025 09 08 22:27:10
Received: 2025 09 08 22:34:08
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Host Header Injection - silverstripecmsv6.0.0 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/8   
Published: 2025 09 08 22:27:10
Received: 2025 09 08 22:34:08
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Nominations Are Open: DevOps Dozen 2025 - published about 2 months ago.
Content: ... devsecops, generative AI, golden paths, internal developer platforms, observability solution, platform engineering, Predict 2026, Software Supply ...
https://devops.com/nominations-are-open-devops-dozen-2025/   
Published: 2025 09 08 22:26:44
Received: 2025 09 08 23:23:26
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Nominations Are Open: DevOps Dozen 2025 - published about 2 months ago.
Content: ... devsecops, generative AI, golden paths, internal developer platforms, observability solution, platform engineering, Predict 2026, Software Supply ...
https://devops.com/nominations-are-open-devops-dozen-2025/   
Published: 2025 09 08 22:26:44
Received: 2025 09 08 23:23:26
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Application modernization and Heroku's path ahead - SiliconANGLE - published about 2 months ago.
Content: DevSecOps was a unifying theme throughout, emphasizing security and automation at every stage. The summit featured tech vendors, including Heroku ...
https://siliconangle.com/2025/09/08/heroku-application-modernization-appdevsummit/   
Published: 2025 09 08 22:11:19
Received: 2025 09 08 22:43:14
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Application modernization and Heroku's path ahead - SiliconANGLE - published about 2 months ago.
Content: DevSecOps was a unifying theme throughout, emphasizing security and automation at every stage. The summit featured tech vendors, including Heroku ...
https://siliconangle.com/2025/09/08/heroku-application-modernization-appdevsummit/   
Published: 2025 09 08 22:11:19
Received: 2025 09 08 22:43:14
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: JLR calls in security specialists and law enforcement to sort cyber attack - Motor Trader - published about 2 months ago.
Content: Jaguar Land Rover is working with cyber security specialists to kick start its global business which was seriously impacted by a cyber-attack.
https://www.motortrader.com/motor-trader-news/automotive-news/jlr-calls-in-security-specialists-and-law-enforcement-to-sort-cyber-attack-08-09-2025   
Published: 2025 09 08 22:08:36
Received: 2025 09 09 02:22:09
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: JLR calls in security specialists and law enforcement to sort cyber attack - Motor Trader - published about 2 months ago.
Content: Jaguar Land Rover is working with cyber security specialists to kick start its global business which was seriously impacted by a cyber-attack.
https://www.motortrader.com/motor-trader-news/automotive-news/jlr-calls-in-security-specialists-and-law-enforcement-to-sort-cyber-attack-08-09-2025   
Published: 2025 09 08 22:08:36
Received: 2025 09 09 02:22:09
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: [Zero-Day] AppleMediaServices Fail-Open Auth Bypass (All Platforms) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/6   
Published: 2025 09 08 22:07:16
Received: 2025 09 08 22:34:08
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: [Zero-Day] AppleMediaServices Fail-Open Auth Bypass (All Platforms) - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/6   
Published: 2025 09 08 22:07:16
Received: 2025 09 08 22:34:08
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: (iOS 18.6.2) Improper Input Validation in Siri Shortcuts and Shared Web Credentials - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/5   
Published: 2025 09 08 22:07:15
Received: 2025 09 08 22:34:08
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: (iOS 18.6.2) Improper Input Validation in Siri Shortcuts and Shared Web Credentials - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/5   
Published: 2025 09 08 22:07:15
Received: 2025 09 08 22:34:08
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Certified Asterisk Security Release certified-18.9-cert17 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/4   
Published: 2025 09 08 22:06:06
Received: 2025 09 08 22:34:08
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Certified Asterisk Security Release certified-18.9-cert17 - published about 2 months ago.
Content:
https://seclists.org/fulldisclosure/2025/Sep/4   
Published: 2025 09 08 22:06:06
Received: 2025 09 08 22:34:08
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: SK Telecom Hit With a Record Data Breach Fine Over Cybersecurity Failures Exposing 23.2 ... - published about 2 months ago.
Content: Alicia Hope has been a journalist for more than 5 years, reporting on technology, cyber security and data privacy news. Related.
https://www.cpomagazine.com/data-protection/sk-telecom-hit-with-a-record-data-breach-fine-over-cybersecurity-failures-exposing-23-2m-people/   
Published: 2025 09 08 22:03:40
Received: 2025 09 08 23:01:46
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: SK Telecom Hit With a Record Data Breach Fine Over Cybersecurity Failures Exposing 23.2 ... - published about 2 months ago.
Content: Alicia Hope has been a journalist for more than 5 years, reporting on technology, cyber security and data privacy news. Related.
https://www.cpomagazine.com/data-protection/sk-telecom-hit-with-a-record-data-breach-fine-over-cybersecurity-failures-exposing-23-2m-people/   
Published: 2025 09 08 22:03:40
Received: 2025 09 08 23:01:46
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: New Round of Stolen OAuth Tokens Obtained From Salesloft Drift Platform Led to ... - CPO Magazine - published about 2 months ago.
Content: Cyber SecurityNews. ·4 min read. New Round of Stolen OAuth Tokens ... Cyber SecurityNews · Credit Monitoring Behemoth TransUnion Suffers Data ...
https://www.cpomagazine.com/cyber-security/new-round-of-stolen-oauth-tokens-obtained-from-salesloft-drift-platform-led-to-compromise-of-cloudflare-palo-alto-networks-zscaler/   
Published: 2025 09 08 22:03:04
Received: 2025 09 09 02:22:09
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: New Round of Stolen OAuth Tokens Obtained From Salesloft Drift Platform Led to ... - CPO Magazine - published about 2 months ago.
Content: Cyber SecurityNews. ·4 min read. New Round of Stolen OAuth Tokens ... Cyber SecurityNews · Credit Monitoring Behemoth TransUnion Suffers Data ...
https://www.cpomagazine.com/cyber-security/new-round-of-stolen-oauth-tokens-obtained-from-salesloft-drift-platform-led-to-compromise-of-cloudflare-palo-alto-networks-zscaler/   
Published: 2025 09 08 22:03:04
Received: 2025 09 09 02:22:09
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained

All Articles

Ordered by Date Published : Year: "2025" Month: "09" Day: "08" Hour: "22"
Page: 1 (of 0)

Total Articles in this collection: 44


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor