'He could smell that you had money': Victims reveal the tricks DJ Carey used to exploit adoring friends and fans, why his open secret went ignored for years and why there could still be dozens more defrauded by bogus cancer claim
TV star Dermot Murnaghan shares message of hope with cancer sufferers after revealing his own health battle
Australia Introduces 'Landmark' Streaming Content Quotas
Read more of this story at Slashdot.
The heartbreaking moment top-flight footballers collapse as they are told their manager, 44, has died mid-match after heart attack in the dug-out
Chaos as police swoop on two Halloween house parties after they were gatecrashed by hundreds of teenagers who spilled into streets
Natalie Cassidy reignites row with Paloma Faith as she doubles down on claims she was bullied at school because people were 'jealous' of her EastEnders fame after singling out singer
Mother-of-two, 57, was bedridden for two years after GP dismissed signs of brain tumour as 'depression, fibromyalgia and menopause'
Arista Modular Switches Aim At Scale Across Networks, Hit Scale Out, Too
Chip designs are busting out beyond the reticle limits of lithography machines, making chiplets and high-bandwidth, in-package die-to-die interconnects inevitable. …
Arista Modular Switches Aim At Scale Across Networks, Hit Scale Out, Too was written by Timothy Prickett Morgan at The Next Platform.
MPs commend Daily Mail for exposing top-secret airlift of Afghans to Britain after mass data breach
'They're not our people. They never will be': How the Cotswolds are being invaded by a loud 'new money' set with black Porsche SUVs, bristling security and bizarre late-night demands... and the well-heeled locals are furious
Dick Cheney dead: Vice President who served with George W. Bush and took leading role in 'war on terror' dies at 84
Mortgage war erupts: Nationwide cuts rates to 3.64% as households see cheapest deals since 2022
Sadiq Khan revives his feud with Donald Trump as he urges New Yorkers to elect left-winger Zohran Mamdani as their city's new mayor
BBC Breakfast guest breaks down in tears and sobs 'she should be here' recounting death of two-year-old daughter after fatal misdiagnosis
Cristiano Ronaldo opens up on how his daughters convinced him to propose to fiancée Georgina Rodriguez - with £1.5m ring - as he reveals details of 'not romantic' proposal for the first time
The Most Critical Linux Kernel Breaches of 2025 So Far
The Linux kernel, foundational for servers, desktops, embedded systems, and cloud infrastructure, has been under heightened scrutiny. Several vulnerabilities have been exploited in real-world attacks, targeting critical subsystems and isolation layers. In this article, we’ll walk through major examples, explain their significance, and offer actionable guidance for defenders.
CVE-2025-21756 – Use-After-Free in the vsock SubsystemOne of the most alarming flaws this year involves a use-after-free vulnerability in the Linux kernel’s vsock implementation (Virtual Socket), which enables communication between virtual machines and their hosts.
How the exploit works: A malicious actor inside a VM (or other privileged context) manipulates reference counters when a vsock transport is reassigned. The code ends up freeing a socket object while it’s still in use, enabling memory corruption and potentially root-level access.
Why it matters: Since vsock is used for VM-to-host and inter-VM communication, this flaw breaks a key isolation barrier. In multi-tenant cloud environments or container hosts that expose vsock endpoints, the impact can be severe.
Mitigation: Kernel maintainers have released patches. If your systems run hosts, hypervisors, or other environments where vsock is present, make sure the kernel is updated and virtualization subsystems are patched.
CVE-2025-38236 – Out-of-Bounds / Sandbox Escape via UNIX Domain SocketsAnother high-impact vulnerability involves the UNIX domain socket interface and the MSG_OOB flag. The bug was publicly detailed in August 2025 and is already in active discussion.
Attack scenario: A process running inside a sandbox (for example a browser renderer) can exploit MSG_OOB operations on a UNIX domain socket to trigger a use-after-free or out-of-bounds read/write. That allows leaking kernel pointers or memory and then chaining to full kernel privilege escalation.
Why it matters: This vulnerability is especially dangerous because it bridges from a low-privilege sandboxed process to kernel-level compromise. Many systems assume sandboxed code is safe; this attack undermines that assumption.
Mitigation: Distributions and vendors (like browser teams) have disabled or restricted MSG_OOB usage for sandboxed contexts. Kernel patches are available. Systems that run browser sandboxes or other sandboxed processes need to apply these updates immediately.
CVE-2025-38352 – TOCTOU Race Condition in POSIX CPU TimersIn September 2025, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog.
Go to Full Article