Security
Headlines
HeadlinesLatestCVEs

Latest News

Zero Day Quest 2025: $1.6 million awarded for vulnerability research

This month, the Microsoft Security Response Center recently welcomed some of the world’s most talented security researchers at Microsoft’s Zero Day Quest, the largest live hacking competition of its kind. The inaugural event challenged the security community to focus on the highest-impact security scenarios for Copilot and Cloud with up to $4 million in potential awards.

msrc-blog
#vulnerability#ios#microsoft#ssrf#zero_day
GHSA-c5jg-wr5v-2wp2: GoBGP does not verify that the input length

An issue was discovered in GoBGP before 3.35.0. pkg/packet/rtr/rtr.go does not verify that the input length corresponds to a situation in which all bytes are available for an RTR message.

GHSA-mfvv-mgf6-q25r: GoBGP crashes in the flowspec parser

An issue was discovered in GoBGP before 3.35.0. An attacker can cause a crash in the pkg/packet/bgp/bgp.go flowspec parser by sending fewer than 20 bytes in a certain context.

GHSA-hqhq-hp5x-xp3w: GoBGP does not properly check the input length

An issue was discovered in GoBGP before 3.35.0. pkg/packet/mrt/mrt.go does not properly check the input length, e.g., by ensuring that there are 12 bytes or 36 bytes (depending on the address family).

GHSA-7m35-vw2c-696v: GoBGP panics due to a zero value for softwareVersionLen

An issue was discovered in GoBGP before 3.35.0. pkg/packet/bgp/bgp.go allows attackers to cause a panic via a zero value for softwareVersionLen.

Did DOGE “breach” Americans’ data? (Lock and Code S06E08)

This week on the Lock and Code podcast, we speak with Sydney Saubestre about DOGE and its access to Americans' data.

Did DOGE “breach” Americans’ data? (Lock and Code S06E08)

This week on the Lock and Code podcast, we speak with Sydney Saubestre about DOGE and its access to Americans' data.

GHSA-wm65-ph3w-587c: QMarkdown Cross-Site Scripting (XSS) vulnerability

QMarkdown (aka quasar-ui-qmarkdown) before 2.0.5 allows XSS via headers even when when no-html is set.

APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

The Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that's targeting diplomatic entities across Europe with a new variant of WINELOADER and a previously unreported malware loader codenamed GRAPELOADER. "While the improved WINELOADER variant is still a modular backdoor used in later stages, GRAPELOADER is a newly observed initial-stage tool

Chinese APT IronHusky Deploys Updated MysterySnail RAT on Russia

Kaspersky researchers report the reappearance of MysterySnail RAT, a malware linked to Chinese IronHusky APT, targeting Mongolia and…