Nyhetsnavet

Samlar nyheter från utvalda källor. Logga in för att spara urval och skapa profiler.

Uppdaterad 2026-04-22 10:13 Nästa om --:--
11 av 11 källor 10 per källa
Arkiv: 7d
Snabbfilter
Toppnyheter Säkerhet
Full coverage Flera perspektiv på samma ämne.
2 källor · 2026-04-21 23:12
Dark Reading The Hacker News
Fler källor:
Security-widgeten är dold. Visa widget
Säkerhet 110 artiklar
1 fler källor
The Hacker News Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023 2026-04-21 16:31
SecurityWeek Vulnerabilities ikon
SecurityWeek Vulnerabilities
Hackers Abuse QEMU for Defense Evasion

The machine emulator has been abused in at least two different campaigns distributing ransomware and remote access tools. The post Hackers Abuse QEMU for Defense Evasion appeared first on SecurityWeek.

Nyhetsbild
The Hacker News ikon
The Hacker News
Why Most AI Deployments Stall After the Demo

The fastest way to fall in love with an AI tool is to watch the demo. Everything moves quickly. Prompts land cleanly. The system produces impressive outputs in seconds. It feels like the beginning of a new era for...

The Hacker News ikon The Hacker News
SecurityWeek Vulnerabilities ikon
SecurityWeek Vulnerabilities
Next.js Creator Vercel Hacked

Vercel confirmed suffering a breach after a hacker claiming to be part of ShinyHunters offered to sell stolen data for $2 million. The post Next.js Creator Vercel Hacked appeared first on SecurityWeek.

Nyhetsbild
CISA KEV-katalog ikon
CISA KEV-katalog
CVE-2026-20122 – Cisco Catalyst SD-WAN Manger

Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by...

CISA KEV-katalog ikon CISA KEV-katalog
CISA KEV-katalog ikon
CISA KEV-katalog
CVE-2026-20133 – Cisco Catalyst SD-WAN Manager

Cisco Catalyst SD-WAN Manager contains an exposure of sensitive information to an unauthorized actor vulnerability that could allow remote attackers to view sensitive information on affected systems. | Åtgärd: Please...

CISA KEV-katalog ikon CISA KEV-katalog
1 fler källor
CISA KEV-katalog CVE-2026-20128 – Cisco Catalyst SD-WAN Manager 2026-04-20 02:00
CISA KEV-katalog ikon
CISA KEV-katalog
CVE-2025-2749 – Kentico Kentico Xperience

Kentico Xperience contains a path traversal vulnerability that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations. | Åtgärd: Apply mitigations per vendor...

CISA KEV-katalog ikon CISA KEV-katalog
CISA KEV-katalog ikon
CISA KEV-katalog
CVE-2023-27351 – PaperCut NG/MF

PaperCut NG/MF contains an improper authentication vulnerability that could allow remote attackers to bypass authentication on affected installations via the SecurityRequestFilter class. | Åtgärd: Apply mitigations...

CISA KEV-katalog ikon CISA KEV-katalog
CISA KEV-katalog ikon
CISA KEV-katalog
CVE-2024-27199 – JetBrains TeamCity

JetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed. | Åtgärd: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for...

CISA KEV-katalog ikon CISA KEV-katalog
1 fler källor
Microsoft MSRC Chromium: CVE-2026-6361 Heap buffer overflow in PDFium 2026-04-17 16:00
Microsoft MSRC ikon
Microsoft MSRC
Chromium: CVE-2026-6364 Out of bounds read in Skia

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2026) for more information.

Microsoft MSRC ikon Microsoft MSRC
Microsoft MSRC ikon
Microsoft MSRC
Chromium: CVE-2026-6363 Type Confusion in V8

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2026) for more information.

Microsoft MSRC ikon Microsoft MSRC
Microsoft MSRC ikon
Microsoft MSRC
Chromium: CVE-2026-6362 Use after free in Codecs

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2026) for more information.

Microsoft MSRC ikon Microsoft MSRC
1 fler källor
Microsoft MSRC Chromium: CVE-2026-6318 Use after free in Codecs 2026-04-17 16:00
Microsoft MSRC ikon
Microsoft MSRC
Chromium: CVE-2026-6359 Use after free in Video

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2026) for more information.

Microsoft MSRC ikon Microsoft MSRC
Microsoft MSRC ikon
Microsoft MSRC
Chromium: CVE-2026-6314 Out of bounds write in GPU

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2026) for more information.

Microsoft MSRC ikon Microsoft MSRC
Microsoft MSRC ikon
Microsoft MSRC
Chromium: CVE-2026-6310 Use after free in Dawn

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2026) for more information.

Microsoft MSRC ikon Microsoft MSRC
CERT-SE ikon
CERT-SE
CERT-SE:s veckobrev v.16

Bland veckans läsning i veckobrevet finns råd för ökad säkerhet inom OT, som Nationellt cybersäkerhetscenter (NCSC) nyligen publicerat. Utöver det hittar du information om ett antal sårbarheter och rapporter att läsa.

CERT-SE ikon CERT-SE
SecurityWeek Vulnerabilities ikon
SecurityWeek Vulnerabilities
Another DraftKings Hacker Sentenced to Prison

Kamerin Stokes sold stolen credentials through an online marketplace even after pleading guilty to his role in the DraftKings attack. The post Another DraftKings Hacker Sentenced to Prison appeared first on SecurityWeek.

Nyhetsbild
SecurityWeek Vulnerabilities ikon
SecurityWeek Vulnerabilities
Cursor AI Vulnerability Exposed Developer Devices

An indirect prompt injection could be chained with a sandbox bypass and Cursor’s remote tunnel feature for shell access to machines. The post Cursor AI Vulnerability Exposed Developer Devices appeared first on...

Nyhetsbild