Some context and analysis about attacks on| /dev/posts/
I found a cross-origin/same-site request forgery vulnerability| /dev/posts/
I found| /dev/posts/
How I found remote code execution vulnerabilities| /dev/posts/
by Georgios A. Serghides[i] *** A note from the team: To celebrate the 15th anniversary of the Strasbourg Observers Blog, we organised an in-person symposium with scholars, practitioners, and members of the ECtHR on 8–9 May 2025 in Ghent. Connecting in person with so many regular contributors was a wonderful experience and led to engaging […] The post Stereotyped narratives on migration: Is the ECtHR’s reasoning stereotype-proof? appeared first on Strasbourg Observers.| Strasbourg Observers
by Dr Dolores Morondo Taramundi *** To celebrate the 15th anniversary of the Strasbourg Observers Blog, we organised an in-person symposium with scholars, practitioners, and members of the ECtHR on 8–9 May 2025 in Ghent. Connecting in person with so many regular contributors was a wonderful experience and led to engaging dialogue with current and […] The post The Role of Vulnerability and Stereotyping in Addressing Discrimination Against Migrants appeared first on Strasbourg Observers.| Strasbourg Observers
A newly discovered vulnerability in the AI supply chain—termed Model Namespace Reuse—permits attackers to achieve Remote Code Execution (RCE) across major AI platforms, including Microsoft Azure AI Foundry, Google Vertex AI, and thousands of open-source projects. By re-registering abandoned or deleted model namespaces on Hugging Face, malicious actors can trick pipelines that fetch models by […] The post Namespace Reuse Vulnerability Exposes AI Platforms to Remote Code Execution appeare...| GBHackers Security | #1 Globally Trusted Cyber Security News Platform
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert about a serious security hole in certain TP-Link devices. This flaw, tracked as CVE-2020-24363, allows an attacker on the same network to take control without needing a password. CISA warns that this weakness is already being actively exploited by bad actors. Vulnerability Details […] The post CISA Alerts on TP-Link Authentication Flaw Under Active Exploitation appeared first on GBHackers Security | #1 Glob...| GBHackers Security | #1 Globally Trusted Cyber Security News Platform
A low-severity security issue in Apache DolphinScheduler has been addressed in the latest release. Identified as CVE-2024-43166 and classified under CWE-276: Incorrect Default Permissions, this vulnerability affects all DolphinScheduler versions prior to 3.2.2. Users are strongly advised to upgrade to version 3.3.1 as soon as possible to mitigate potential risks. Apache DolphinScheduler is an open-source, […] The post Apache DolphinScheduler Vulnerability Patched — Update Immediately appe...| GBHackers Security | #1 Globally Trusted Cyber Security News Platform
NVIDIA today released critical security updates for its BlueField, ConnectX, DOCA, Mellanox DPDK, Cumulus Linux, and NVOS products. The Partner Security Bulletin addresses multiple vulnerabilities that could allow denial of service (DoS), escalation of privileges (EoP), and information disclosure. Customers are urged to download and install updated components immediately to protect their systems. To get […] The post NVIDIA Patches Vulnerabilities Causing DoS, EoP, and Data Exposure appeared...| GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Google has released Chrome 140 to the stable channel for Windows, Mac, and Linux. This update will roll out to users over the coming days and weeks. The new version, 140.0.7339.80 for Linux and 140.0.7339.80/81 for Windows and Mac, delivers several security fixes and improvements. A full list of changes is available in the Chromium log. […] The post Chrome 140 Release Fixes Critical RCE Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.| GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Android users worldwide must install the September 2025 security patch without delay to safeguard their devices against high-severity vulnerabilities now being actively exploited in the wild. Released as part of the Android Security Bulletin on September 1, 2025, the update carries a security patch level of 2025-09-05 or later and addresses multiple critical flaws—two of […] The post Android Security Update Patches Actively Exploited 0-Day Vulnerabilities appeared first on Cyber Security ...| Cyber Security News
Microsoft has confirmed a newly disclosed remote code execution (RCE) vulnerability in its IIS Web Deploy toolchain, tracked as CVE-2025-53772. The flaw resides in the unsafe deserialization logic of the msdeployagentservice and msdeploy.axd endpoints, allowing authenticated attackers to execute arbitrary code on vulnerable web servers. As enterprises worldwide rely on Web Deploy for automated deployments, […] The post Public PoC Released for IIS WebDeploy RCE Vulnerability appeared first o...| Cyber Security News
In a pivotal shift for cyber offense, the newly released Hexstrike-AI framework equips threat actors with an orchestration “brain” that can direct more than 150 specialized AI agents to autonomously scan, exploit, and persist within target environments. Within hours of its public launch, dark-web chatter confirmed adversaries leveraging Hexstrike-AI to weaponize recent Citrix NetScaler ADC […] The post Hackers Exploit Zero-Day Vulnerabilities in Minutes Using Hexstrike-AI appeared first...| Cyber Security News
| Tan Li Hau's Blog
A sophisticated attack campaign has leveraged a previously unknown zero-day vulnerability in WhatsApp on Apple devices to target specific users, the company has confirmed. The vulnerability, now identified as CVE-2025-55177, was combined with a separate vulnerability in Apple’s operating systems to compromise devices and access user data. WhatsApp has since patched the vulnerability and has […] The post WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users appeared first on Cyb...| Cyber Security News
A significant global effort to patch a critical zero-day remote code execution (RCE) vulnerability in Citrix NetScaler devices has seen the number of exposed systems drop from approximately 28,200 to 12,400 in just one week.| Cyber Security News
A well-known red team tactic for blending Command-and-Control (C2) traffic in with legitimate network traffic involves utilizing Amazon Web Services […]| GuidePoint Security
Canonical has recently patched a number of security flaws in Graphviz as well as the Linux kernel that powers Ubuntu.... The post Critical Ubuntu Vulnerabilities allow malicious code execution appeared first on IICS.| IICS
Aruba Networks, anteriormente conocida como Aruba Wireless Networks, es una subsidiaria de redes inalámbricas con sede en Santa Clara, California,... The post 13 vulnerabilidades críticas en Aruba InstantOS y ArubaOS appeared first on IICS.| IICS
A security alert concerning CVE-2022-3236, a code injection flaw that impacts the Sophos Firewall’s User Portal and Webadmin and might... The post Critical remote code execution vulnerability in Sophos Firewall appeared first on IICS.| IICS
In its latest security alert, the team behind Drupal reported finding a set of severe vulnerabilities in a third-party library.... The post <strong>High-Risk Vulnerability in Third-Party Service Allows Take Control of Drupal Websites</strong> appeared first on IICS.| IICS
The vulnerabilities, tracked as CVE-2025-7775, CVE-2025-7776, and CVE-2025-8424, pose significant risks to organizations relying on these network infrastructure components for application delivery and secure remote access.| Cyber Security News
Cyble Vulnerability Intelligence researchers tracked 971 vulnerabilities over the past week, as monthly Patch Tuesday releases from vendors yielded a high number of new bugs. More than 142 of the disclosed vulnerabilities already have publicly available Proofs-of-Concept (PoCs), a rate that’s lower than the recently seen 20-30% exploitation rate, but still shows how quickly new vulnerabilities can be exploited. 54 vulnerabilities were rated as critical under CVSS v3.1, while 33 received...| Cyble Podcast | Cybersecurity & Threat Intelligence Insights
In the latest weekly vulnerability insights to clients, Cyble Research & Intelligence Labs has spotlighted a concerning surge in security weaknesses affecting a broad spectrum of digital products and services. From July 30 to August 5, 2025, Cyble’s vulnerability intelligence module tracked 717 new vulnerabilities. Among these, more than 222 come with publicly available Proof-of-Concept (PoC) exploits, signaling an increased likelihood of imminent cyberattacks and reducing the defenders...| Cyble Podcast | Cybersecurity & Threat Intelligence Insights
Released on August 14, 2025, this major update introduces groundbreaking features that extend VirtualBox's capabilities across multiple platforms| Cyber Security News
The flaw, tracked as CVE-2025-2183 with a CVSS score of 4.5, affects the certificate validation process in GlobalProtect applications running on Windows and Linux systems.| Cyber Security News
CISA has issued urgent warnings regarding two critical security vulnerabilities in N-able N-Central remote monitoring and management (RMM) software that are actively being exploited by threat actors.| Cyber Security News
| Open Source Security Foundation
research shared with TechCrunch ahead of publication on Tuesday| Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A critical security vulnerability in Fortinet FortiSIEM platform that allows unauthenticated attackers to execute arbitrary commands remotely.| Cyber Security News
Zoom has disclosed a critical vulnerability affecting multiple Windows-based clients, potentially allowing attackers to escalate privileges and compromise user systems.| Cyber Security News
A tool that automates the delivery of malware from external attackers to target employees’ Microsoft Teams inbox has been released.| Help Net Security
Organizations face increased vulnerability to cyber-attacks due to a longer timeframe for addressing low employee cybersecurity awareness.| Help Net Security
Researchers have detected an unprecedented surge in brute-force attacks targeting Fortinet SSL VPN infrastructure, with over 780 unique IP addresses participating in coordinated assault campaigns.| Cyber Security News
Ivanti has released critical security updates addressing multiple high and medium-severity vulnerabilities across its Connect Secure, Policy Secure, and Zero Trust Access (ZTA) gateway products.| Cyber Security News
A severe flaw in a major automaker’s dealer portal that allowed unauthorized attackers to register for dealer accounts, escalate privileges to a national administrator, and ultimately control vehicles remotely.| Cyber Security News
Akira and Lockbit ransomware groups are trying to breach Cisco ASA SSL VPN devices by exploiting older vulnerabilities.| Help Net Security
A student shares her experience with vulnerability and argues that it is crucial to connect with others.| The Temple News
Follow us on Twitter @HackRead| Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Follow us on Twitter @HackRead| Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Follow us on Twitter @HackRead| Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Follow us on Twitter @HackRead| Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cyble Vulnerability Intelligence researchers tracked 737 vulnerabilities over the last week, and more than 145 of the disclosed vulnerabilities already have publicly available Proof-of-Concepts (PoCs), just below the 21% exploitation rate observed by Cyble last week. Of the hundreds of IT and industrial control system (ICS) vulnerabilities examined this week, Cyble researchers flagged more than a dozen vulnerabilities for high-priority attention by security teams. The following are highlights...| Cyble Podcast | Cybersecurity & Threat Intelligence Insights
ACSC alerts on CVE-2025-53770, a SharePoint flaw under active attack. Urges immediate patching to protect on-premises systems from remote code execution.| Cyble
InfectedSlurs botnet appears to be a new spreading point for Mirai malware: it targets IoT devices using a 0-day vulnerability.| Gridinsoft Blogs
This cybersecurity article highlights the vulnerability in popular ransomware products as demonstrated by a cybersecurity analyst on YouTube.| Gridinsoft Blogs
BBVA celebrated Father's Day through vulnerable leadership, inviting dads to share honest stories of failure and growth.| The Failure Institute
Vulnerability is often perceived as a sign of weakness by the society. Contrary to popular belief, vulnerability is not a sign of fragility; rather, it… The post Embracing Vulnerability: The Key to Mental Strength and Well-being appeared first on Psychology of Everything.| Psychology of Everything
Google releases a Chrome update that fixes a yet another 0-day vulnerability, which appears to be the first Chrome zero-day in 2024| Gridinsoft Blogs
CrushFTP disclosed fixing a critical unauthenticated access flaw in their protocol, that may already be exploited in the wild.| Gridinsoft Blogs
CVE-2025-53770 and CVE-2025-53771 are currently being exploited in the wild. However, users of HAProxy Enterprise WAF are protected automatically.| HAProxy Technologies
I received the loveliest bit of feedback recently about my demeanor as a writer. The educator in me knows that very often we’re driven for concluding remarks when we seek input from others. Hoping for high fives and praise… hoping for thoughtful queries conveying interest and approval. But I learned something new last week that […]| Victoria Ponders
Okta goes passwordless by making password checking... optional.| authentik Blog
The Lapsus$ hack group has published the source codes for Bing, Cortana and other Microsoft products stolen from an internal DevOps server.| Gridinsoft Blogs
Actively exploited SLP vulnerability (CVE-2023-29552) poses high-severity threat. CISA recommends swift mitigation measures.| Gridinsoft Blogs
Top vulnerabilities in 2024 and how to prevent them. Learn about Critical TCP/IP flaw, CVE-2024-38189, and CVE-2024-38178 exploits.| Gridinsoft Blogs
Did anyone ever accuse you of being condescending? The word itself feels like a shirt worn backwards. It happened to me recently, in a late-night| lev.lc
Grafana Labs has released critical security patches addressing two significant vulnerabilities, redirect users to malicious websites.| GBHackers Security | #1 Globally Trusted Cyber Security News Platform
No one has lived your call or your story. Only you and God get to embark on the journey of finding the words and actions to share what those two things truly mean for you and the world.| Good Faith Media
Discover how failure stories shared at the Conference Center Aguascalientes inspired growth, resilience, and learning.| The Failure Institute
A technical exploration of Local Privilege Escalation Vulnerability in ControlPlane on macOS.| Quarkslab's blog
featured image| SweetCode Blog
A critical vulnerability, tracked as CVE-2025-49826, has been discovered and addressed in the popular React-based web framework, Next.js.| GBHackers Security | #1 Globally Trusted Cyber Security News Platform
One of the vulnerabilities highlighted by Cyble has more than 500,000 internet-facing exposures.| Cyble
Introduction As you may know, Compass Security participated in the 2023 edition of the Pwn2Own contest in Toronto and was able to successfully compromise the Synology BC500 camera using a remote code execution vulnerability. If you missed this, head over to the blog post here https://blog.compass-security.com/2024/03/pwn2own-toronto-2023-part-1-how-it-all-started/ Unfortunately, the same vulnerability was also identified by other […]| Compass Security Blog
Cisco Talos uncovered and analyzed two critical vulnerabilities in ASUS' AsIO3.sys driver, highlighting serious security risks and the importance of robust driver design.| Cisco Talos Blog
A sophisticated cyberattack campaign has emerged, exploiting a critical vulnerability in Langflow, a widely-used Python-based framework.| GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Inspiring global teams with failure stories was the vision when SKAN, a biopharmaceutical technology leader, partnered with The Failure Institute. Their challenge was to connect employees across Japan, Switzerland, Germany, Brazil, Belgium, Poland, and the U.S. through shared meaning. They launched oneSKAN: The Summit — a 2-day global experience where over 300 participants explored how […] The post Inspiring Global Teams With Failure Stories: How SKAN Found Connection appeared first on Th...| The Failure Institute
In design, tech, and innovation, creative failure strategies are often overlooked. But for elite teams, learning how creative teams growth through failure becomes essential. In this high-pressure world, where excellence is expected, how can we stay innovative without falling into perfectionism? Instrument is a creative agency that has worked with brands like Nike, Google, Levi’s, […] The post How Creative Teams Growth Through Failure to Create Better (and Faster) appeared first on The Fai...| The Failure Institute
Is your team struggling with idea sharing? At The Failure Institute, we’ve seen how silence can stifle innovation. Learning how to encourage diverse ideas in the workplace is crucial for growth, engagement, and agility. We’ve facilitated private events for companies across industries and continents—where we hear stories that are tragic, hilarious, and always honest. These […] The post How to Encourage Diverse Ideas in the Workplace appeared first on The Failure Institute.| The Failure Institute
Learn how sharing failure stories at the SOEM Summit improves event safety planning with The Failure Institute.| The Failure Institute
Citrix has disclosed two high-impact vulnerabilities—CVE-2025-5777 (dubbed CitrixBleed 2) and CVE-2025-5349—affecting NetScaler ADC and Gateway appliances. These flaws, particularly CitrixBleed 2, enable unauthenticated attackers to extract sensitive session data directlyRead More → The post MFA? Irrelevant. CitrixBleed 2 Lets Hackers Take Over Without Logging In appeared first on Information Security Newspaper | Hacking News.| Information Security Newspaper | Hacking News
A critical pre-authentication vulnerability (CVE-2025-6709) in MongoDB Server enables unauthenticated attackers to trigger denial-of-service (DoS).| GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Designated as Premature Pairing Random Injection, this flaw affects the Realtek RTL8762EKF-EVB development platform running SDK v1.4.0.| Cyber Security News
Introduction Zero-day vulnerabilities represent some of the most dangerous threats in the cybersecurity landscape. These are flaws in software or hardware that are unknown to the vendor and therefore unpatched. Once discovered by attackers, they can be exploited before any defense is in place. In this environment, Zero Trust Access Against Zero-Day Attacks emerges as a critical strategy. By enforcing strict verification, minimizing privileges, and continuously monitoring activity, Zero Trust ...| hyper-ict.com
A privilege escalation flaw in Windows Server 2025 can be leveraged to compromise any user in Active Directory, including Domain Admins.| Help Net Security
The following article explains how, during an audit, we examined Moodle (v4.4.3) and found ways of bypassing all the restrictions preventing SSRF vulnerabilities from being exploited.| Quarkslab's blog
The Open Source Technology Improvement Fund, Inc, thanks to funding provided by Sovereign Tech Fund, engaged with Quarkslab to perform a security audit of PHP-SRC, the interpreter of the PHP language.| Quarkslab's blog
A signature verification bypass in a function that verifies the integrity of ZIP archives in the AOSP framework| Quarkslab's blog
A technical exploration of a trivial Local Privilege Escalation Vulnerability in CCleaner <= v1.18.30 on macOS.| Quarkslab's blog
Following the introduction of crypto-condor and differential fuzzing in earlier blogposts, we showcase a use case where Quarsklab's automated test suite for cryptographic implementations allowed us to improve the reference implementation of the recently standardized HQC scheme.| Quarkslab's blog
The following article describes how, during an "assumed breach" security audit, we compromised multiple web applications on our client's network in order to carry out a watering hole attack by installing fake Single Sign-On pages on the compromised servers. This article is the first of a two-part series and explains why it is not enough to just check for CVEs, and why we should dive deep into the code to look for new vulnerabilities in old code bases. We will take phpMyAdmin version 2.11.5 as...| Quarkslab's blog
In this series of articles we describe how, during an "assumed breach" security audit, we compromised multiple web applications on our client's network to carry out a watering hole attack by installing fake Single Sign-On pages on compromised servers. In our second episode we take a look at SOPlanning, a project management application that we encountered during the audit.| Quarkslab's blog
Apple released iOS 18.3.1 (build 22D72) to patch a vulnerability tied to the Accessibility framework and reported by Citizen Lab. Let's analyze it!| Quarkslab's blog
In this blog post we explain the consequences of asking our R&D boss for a Steam Deck as a Christmas gift. It involves a couple of vulnerabilities, limited primitives, challenging exploitation and a long disclosure process.| Quarkslab's blog
Cyble highlights critical IT and ICS vulnerabilities, including actively exploited flaws in Ivanti, Versa, and Microsoft detected via its honeypot sensors.| Cyble
This week in my Engineering Manager Challenges newsletter, I wrote my approach to building a platform team. It’s the twentieth week I’ve been publishing on Substack, and so far, I’m okay with the results: 127 subscribers with a roughly 50% open rate. I’m starting to run| Péter Szász
Microsoft disclosed a critical security vulnerability in Windows Remote Desktop Services yesterday that could enable unauthorized attackers to execute malicious code.| Cyber Security News
SAP NetWeaver vulnerability CVE-2025-31324 is a vulnerability that may lead to server hijacking and RCE via unrestricted file uploads.| CIP Blog
While attempting to compare the security level of various VPN vendors, I kept falling down the path of searching for vulnerabilities instead. This blog post details the ones I discovered in SonicWall’s SMA 500, which were patched in December 2024. This post has been delayed to coincide with my talk at SecurityFest on this exact … Continue reading SonicDoor – Cracking SonicWall’s SMA 500| SCRT Team Blog
A Better Group Protection for Refugee Women By Jean-Yves Carlier and Eleonora Frasca, Université catholique de Louvain (UCLouvain), members of…| EU Immigration and Asylum Law and Policy
Microsoft has rolled out a comprehensive set of security enhancements aimed at countering the surge in AiTM phishing attacks.| Cyber Security News
Talos has observed exploitation of CVE-2025-0994 in the wild by UAT-6382, a Chinese-speaking threat actor, who then deployed malware payloads via TetraLoader.| Cisco Talos Blog
Cyble reports on critical IT vulnerabilities in SAP, Ivanti, Fortinet, ASUS, and others. Urgent patches needed for IT and ICS systems to prevent attacks.| Cyble
Apple has released critical security updates for macOS Sequoia, addressing multiple vulnerabilities that could allow malicious applications to access sensitive user data.| Cyber Security News
Several years ago, I had to stay late at work. I was finishing up a project. Out of the corner of my eye, I noticed my boss’ boss, a managing director of the firm, pacing the floor. He was on…| The Heart of the Matter
Did you catch Daniel Abrahams’ latest – “Writing is Rewriting”? Oof! It’s the space I’m in right now and when I stumbled across his blog post recently, I felt li…| The Heart of the Matter
The two vulnerabilities that Microsoft reports have been actively exploited in the wild and are publicly known are both rated as only being of “moderate” severity.| Cisco Talos Blog
As a pentester you are sometimes thrown into projects where you have no idea where you are going to end up. This project was one of those where you were given a customer laptop and the aim was to “find something interesting”, perhaps a misconfiguration on the customer side. The problem was that the laptop provided was being treated as a thin client, where the laptop is mainly used to access a remote desktop and use the browser with no additional software installed.| blog.compass-security.com