A 13‑year Redis flaw (CVE‑2025‑49844) allows attackers to escape Lua sandbox and run code on hosts. See Wiz Research’s analysis and mitigations.| wiz.io
Researchers from UC Riverside and Tsinghua University found a new way to revive a decade-old DNS cache poisoning attack. Read our deep dive into how the SAD DNS attack on DNS resolvers works, how we protect against this attack in 1.1.1.1, and what the future holds for DNS cache poisoning attacks.| The Cloudflare Blog
Apple has introduced a new hardware/software security feature in the iPhone 17: “Memory Integrity Enforcement,” targeting the memory safety vulnerabilities that spyware products like Pegasus tend to use to get unauthorized system access. From Wired: In recent years, a movement has been steadily growing across the global tech industry to address a ubiquitous and insidious type of bugs known as memory-safety vulnerabilities. A computer’s memory is a shared resource among all programs, and...| Schneier on Security
The flaws could allow attackers to escalate privileges, manipulate notifications, and enumerate usernames. The post High-Severity Vulnerabilities Patched in VMware Aria Operations, NSX, vCenter appeared first on SecurityWeek.| SecurityWeek
Overview While Windows shortcut (LNK) files are designed for user convenience, they have long been exploited as initial access vectors by threat actors. Since Microsoft strengthened its macro-blocking policies in 2022, attackers have increasingly turned to alternative formats such as ISO, RAR, and LNK files in their attacks. LNK files are commonly distributed via email […]| ASEC
FreePBX Authentication Bypass RCE| Horizon3.ai
Libraesva has addressed a vulnerability in its integrated email security platform that has been exploited in the wild.| SecurityWeek
Expect this to get exploited - like the bug before it...| The Stack
Cisco recently addressed multiple vulnerabilities in IOS XR, one of which could allow image signature… Cisco Patched Multiple IOS XR Vulnerabilities on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses.| Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Test...
Microsoft has released the scheduled Patch Tuesday updates for September 2025, addressing 81 security vulnerabilities… Microsoft Fixed 2 Zero-Days Amid 80+ Patches With September 2025 Patch Tuesday on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses.| Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Test...
Heads up, WhatsApp users. A serious zero-day vulnerability existed in WhatsApp that was already exploited… WhatsApp Addressed An Actively Exploited Zero-Day Vulnerability on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses.| Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Test...
HMI products made by Novakon are affected by serious vulnerabilities, and the vendor does not appear to have released any patches.| SecurityWeek
This Threat Brief discusses observations on a campaign leveraging Salesloft Drift integration to exfiltrate data via compromised OAuth credentials.| Unit 42
Apple has announced major mobile and desktop platform releases and addressed an exploited bug in older platforms.| SecurityWeek
Is your condo corporation safe against cyberattacks? We look at common condo corporation vulnerabilities and cybersecurity solutions.| CPO Management
Zip Slip, Path Traversal Vulnerability during File Decompression ASEC| ASEC
Wrench Attacks: How Old-School Tactics Still Threaten Execs, Crypto Owners Don’t let the name fool you—“$5 wrench attacks” are no joke. What started as a meme has become a real-world threat targeting executives, crypto holders, and high-profile individuals. These attacks don’t rely on complex hacking techniques. They rely on something much simpler: physical force. Criminals […] The post Wrench Attacks: How Old Tactics Still Threaten Crypto Owners appeared first on BlackCloak | Pro...| BlackCloak | Protect Your Digital Life™
🚨 ShinyHunters compromised Google, Qantas & dozens more using OAuth device flow attacks—bypassing MFA without exploiting a single software bug. My deep-dive analysis reveals how they did it and what enterprises must do now to protect their identity infrastructure.| Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from ...
Fortinet FortiSIEM Pre-Authentication Command Injection Vulnerability| Horizon3.ai
In an incident response case, Kaspersky experts discovered new malware that terminates AV processes by abusing the legitimate ThrottleStop driver. Kaspersky solutions successfully counter and detect this threat.| securelist.com
Recent activity targeting telecom infrastructure is assessed with high confidence to overlap with Liminal Panda activity. The actors used custom tools, tunneling and OPSEC tactics for stealth. Recent activity targeting telecom infrastructure is assessed with high confidence to overlap with Liminal Panda activity. The actors used custom tools, tunneling and OPSEC tactics for stealth.| Unit 42
Condo boards need to embrace sustainable operation plans to achieve operational resilience to create a more sustainable community.| CPO Management
Ivanti has released critical security updates addressing multiple high and medium-severity vulnerabilities across its Connect Secure, Policy Secure, and Zero Trust Access (ZTA) gateway products.| Cyber Security News
"Once on the network, the attackers don't waste time. Their actions are a mix of automated scripts for speed and hands-on-keyboard activity"| The Stack
Attacks appear to be "linked to legacy credential use during migrations from Gen 6 to Gen 7 firewalls"| The Stack
Security releases for Multer and On-headers has been published. We recommend that all users upgrade as soon as possible.| expressjs.com
Google recently addressed a serious zero-day vulnerability in its Chrome browser that allowed sandbox escape. The tech giant has rolled out the patch for Chrome for Desktop and Android devices amidst several other bug fixes.| Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Test...
In a bold move to counter the growing number of open-source software supply chain attacks, Google has launched OSS Rebuild, a program designed to automatically rebuild OSS packages in isolatedRead More → The post How to Use Google’s OSS Rebuild: A New Open Source Software Supply Chain Security Tool appeared first on Information Security Newspaper | Hacking News.| Information Security Newspaper | Hacking News
In this Episode of the Practical 365 podcast, Steve and Paul deep dive into the Microsoft 365 Copilot exploit, "Echo Leak," discussing its implications for AI safeguards and the future of agentic AI. The conversation then shifts to a recent global outage affecting Google and Cloudflare, highlighting the challenges of maintaining hyperscale services. We also examine Microsoft's new initiative to offer containerized M365 instances in Europe, addressing concerns over data sovereignty. Finally, t...| Practical 365
Researchers discovered 21 vulnerabilities affecting all the Sierra AirLink routers; they can potentially cause RCE, XSS and DoS attacks.| Gridinsoft Blogs
CVE-2025-48927 found in TeleMessage TM SGNL in May, and reported by KEV in July, allows attackers to trivially extract sensitive credentials via an unauthenticated, exposed /heapdump endpoint.| GreyNoise Labs
Real talk about MCP Spec update (v2025-06-18), including important changes, security implications and what developers should actually care about.| Forge Code Blog
Security update for Multer released. All users are encouraged to upgrade.| expressjs.com
Some months ago, while analyzing a […]| hn security
Citrix has disclosed two high-impact vulnerabilities—CVE-2025-5777 (dubbed CitrixBleed 2) and CVE-2025-5349—affecting NetScaler ADC and Gateway appliances. These flaws, particularly CitrixBleed 2, enable unauthenticated attackers to extract sensitive session data directlyRead More → The post MFA? Irrelevant. CitrixBleed 2 Lets Hackers Take Over Without Logging In appeared first on Information Security Newspaper | Hacking News.| Information Security Newspaper | Hacking News
Discover how CTEM enhances threat prioritization in complex networks and helps security teams focus on critical vulnerabilities.| Strobes Security
Microsoft’s June Patch Tuesday fixes 67 vulnerabilities, including two zero-days, one of which is being actively exploited.| ThreatDown by Malwarebytes
Express.js has overhauled its vulnerability reporting workflow with a unified process, consolidated documentation, and GitHub Security Advisories enabled across all repositories.| expressjs.com
This month's post discusses pentest reports and how the various audiences that consume them sometimes misinterpret what they mean. We cover why findings in a report are not a sign of failure, why "clean" reports aren't always good news, and why it may not be necessary to fix every single identified vulnerability. The post concludes with a few takeaways about how the information in a pentest report helps inform the reader about the report subject's security posture.| Include Security Research Blog
Using an AI powered network traffic analysis tool we built called SIFT, GreyNoise has caught multiple anomalous network payloads with zero-effort that are attempting to disable TrendMicro security features in ASUS routers, then exploit vulnerabilities and novel tradecraft in ASUS AiProtection features on those routers.| GreyNoise Labs
Security release for Multer has been published. We recommend that all users upgrade as soon as possible.| expressjs.com
“If you shame attack research, you […]| hn security
Finished a weekend project that may be useful for onchain vulnerability analysis of deployed smart contracts: https://github.com/Decurity/tx-coverage tx-coverage allows to reveal unused code of live smart contracts by collecting coverage from historical transactions. With it you can discover code that was never executed onchain and may contain potential bugs. The post New tool: tx-coverage first appeared on Raz0r — Web3 Security.| Raz0r — Web3 Security
On April 16, 2025, IBM posted their X-Force 2025 Threat Intelligence Index. Like many reports of this nature, it covers a wide variety of aspects relating to threat intelligence. Of course, one of …| Rants of a deranged squirrel.
“So we wait, this is our […]| hn security
Analysts discovered a new FritzFrog malware sample that uses exploitation of Log4Shell and PwnKit flaws for self-propagation| Gridinsoft Blogs
Read September 2024 Security Releases| Express Blog
Mitre’s CVE’s program—which provides common naming and other informational resources about cybersecurity vulnerabilities—was about to be cancelled, as the US Department of Homeland Security failed to renew the contact. It was funded for eleven more months at the last minute. This is a big deal. The CVE program is one of those pieces of common infrastructure that everyone benefits from. Losing it will bring us back to a world where there’s no single way to talk about vulnerabilities....| Schneier on Security
Vulnerability disclosure analysts are long familiar with so-called “mega advisories”, ones that typically come from vendors and often for products that ship appliances using hundreds of libraries or products with an entire operating system included. Such advisories can literally represent over 500 vulnerabilities in one shot. I’ll try to make this a bit fun! Disclaimer: […]| Rants of a deranged squirrel.
In this episode of WP Builds entitled "Feeling Insecure? Episode #3," Nathan Wrigley and Tim Nash explore various aspects of WordPress security. Tim shares insights into his background in cybersecurity, including his past experience with physical penetration testing. We discuss the Patchstack report on WordPress security, noting an increase in vulnerabilities but reassuring listeners that more vulnerabilities being found isn't necessarily alarming. We get into the complexity of vulnerabilitie...| WP Builds
Wiz Research uncovered RCE vulnerabilities (CVE-2025-1097, 1098, 24514, 1974) in Ingress NGINX for Kubernetes allowing cluster-wide secret access.| wiz.io
Shift to a priority-driven cybersecurity strategy! Learn how risk-based vulnerability management helps focus on what truly matters, reducing cyber risk efficiently. #TruRisk #Cybersecurity| Qualys
Our team hacks space heater firmware updates over wifi in the latest Include Security blog post. We break down, literally and figuratively, each step of the attack to demonstrate how anonymous users on the same wireless network as an affected space heater could overwrite its firmware causing it to behave in unpredictable and potentially dangerous ways!| Include Security Research Blog
In the previous article, we discussed […] The post CVE-2024-49138 Windows CLFS heap-based buffer overflow analysis – Part 2 appeared first on hn security.| hn security
CVE-2024-49138 is a Windows vulnerability detected […]| hn security
In the last part of this […]| hn security
[I wrote this on September 21st, but apparently forgot to ultimately move from GDoc to Blog. I suspect because it really needs to be cleaned up as it is my first draft. Rather than do that, since t…| Rants of a deranged squirrel.
A quick and silly post about a weird exploit situation| GreyNoise Labs
We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include protections and mitigations. We detail the observed limited activity regarding authentication bypass vulnerability CVE-2024-0012 affecting specific versions of PAN-OS software, and include protections and mitigations.| Unit 42
After attending the OST2 – Exp4011 […]| hn security
We examine an LLM jailbreaking technique called "Deceptive Delight," a technique that mixes harmful topics with benign ones to trick AIs, with a high success rate. We examine an LLM jailbreaking technique called "Deceptive Delight," a technique that mixes harmful topics with benign ones to trick AIs, with a high success rate.| Unit 42
On June 5, 2024, SolarWinds released an advisory regarding a path-traversal vulnerability in their “secure” file-transfer product, Serv-U. I wrote about it here back in mid-June when it was fairly recently released. So here we are, three months later - you might be wondering why we’re still talking about this! When the vulnerability was new, I put a lot of work into crafting a very realistic honeypot that not only looks like the product, it also fakes out the filesystem to make it actua...| GreyNoise Labs
A Few weeks ago an Sql Injection was discovered in the TI WooCommerce Wishlist plugin. After checking closer we found another entry point, affecting over 100,000 active installs. Despite the severi…| WPScan
Since 2014, Trusted CI (formerly the Center for Trustworthy Scientific Cyberinfrastructure, a.k.a., CTSC) has delivered concise announcement...| blog.trustedci.org
The Xamarin Security Scanner finds well known security vulnerabilities by analyzing the source code of your Xamarin application.| Marcofolio.net
During a routine audit of various WordPress plugins, we identified some issues in Profile Builder and Profile Builder Pro (50k+ active installs). We discovered an Unauthenticated Privilege Escalati…| WPScan
Which website security tools are really necessary for your site? What to consider before investing in new software. 10 must-have tools you can’t skip.| WPScan
7 factors for choosing the best vulnerability scanner. Top options compared on features, pros, cons, & pricing. 5 things that make a great scanner| WPScan
If you’ve recently encountered the admin user wpsupp-user on your website, it means it’s being affected by this wave of infections. Identifying Contamination Signs: The malware typicall…| WPScan
A few weeks ago a critical vulnerability was discovered in the plugin WP-Automatic. This vulnerability, a SQL injection (SQLi) flaw, poses a severe threat as attackers can exploit it to gain unauth…| WPScan
What tools do you really need to secure a website? How to stay on budget without compromising. The most serious threats and vulnerabilities.| WPScan
CVE-2024-0769 affects D-Link DIR-859 WiFi routers. All revisions, all firmware, and the product is End-of-Life (EOL) meaning it will never recieve a patch.| GreyNoise Labs
Where we track a SolarWinds Serv-U vulnerability with a new honeypot, including tricking a human attacker into making mistakes| GreyNoise Labs
CVE-2024-4577 is a critical argument-injection vulnerability in PHP that affects Windows deployments and leads to a remote code execution.| GreyNoise Labs
Recently I received a message from Mary in Dallas, Texas: I found your blog, someone very close to me is trapped in an MLM - howdo I get her out? Please help. She is in SuperPatch Company and shetells everyone she makes millions, I know for a fact her and herhusband live pay check to| LaConte Consulting | Resilient Profit Strategies
Service Level Agreements (SLAs) are crucial for effective vulnerability management because they establish clear expectations and timelines for addressing security| Strobes Security
This article steps through decrypting FortiGate FortiOS 7.0.x firmware.| GreyNoise Labs
This blog discusses a DLL hijacking vulnerability affecting all versions of Windows Server 2012 (but not Server 2012 R2). This 0-day vulnerability can be exploited for privilege escalation by any regular user and does not require a system reboot, yet it will not be patched by Microsoft.| Vonahi Security's Blog
Earlier this year, our threat researcher found three easily exploitable vulnerabilities in CMS apps, including two that could result in remote code execution (RCE). This article combines write-ups for these vulnerabilities.| Vonahi Security's Blog
How do we find vulnerabilities that aren’t making the news right now? By Sifting through the sensor logs!| GreyNoise Labs
Leverage Shadowserver's Cyber Civil Defence reporting to protect your network from risk.| SENKI
This article steps through the process of discovering CVE-2024-21762, a non-disclosed out-of-bounds write vulnerability in Fortinet FortiOS and FortiProxy.| GreyNoise Labs
Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.| Threatpost
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.| Threatpost
CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.| Threatpost
Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.| threatpost.com
Ivanti has warned all Connect Secure and Policy Secure users to immediately update their systems with the latest versions as two new zero-day vulnerabilities receive patches. The firm admitted detecting active exploitation of one of| Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Test...
Days after releasing a major update, GitLab rolled out another emergency update addressing a serious vulnerability affecting workspace creation. The service urged all users to update to the latest releases at the earliest, assuring that| Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Test...
A severe authentication bypass security flaw riddled the GoAnywhere MFT that could allow creating rogue admin accounts. While the developers patched the vulnerability already, researchers could still develop a working exploit for it, urging users| Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Test...
The Cyberinfrastructure Vulnerabilities team provides concise announcements on critical vulnerabilities that affect science cyberinfrastruc...| blog.trustedci.org
An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.| threatpost.com
Storage infrastructure presents cybersecurity vulnerabilities that are often overlooked. Learn more today.| CIO Insight
Following up on the SHA-3 buffer overflow in the “official” SHA-3 implementation, many people have been asking me how the vulnerability was found…| Nicky Mouha
This is the second post on buffer overflow attacks! Feel free to check out Buffer Overflow Attacks (Part 1) as well.| Nicky Mouha
This is my very first blog post! More will follow…| Nicky Mouha