Author: Joe-W

0

Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution  –

Multiple vulnerabilities have been discovered in Ivanti Products, the most severe of which could allow for remote code execution. Ivanti Endpoint Manager is a client-based unified endpoint management software. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution in the context of the system.   Ivanti Connect Secure is an SSL VPN solution for...

0

Ivanti Flaw CVE-2025-0282 Actively Exploited, Impacts Connect Secure and Policy Secure – [email protected] (The Hacker News)

[[{“value”:”Ivanti is warning that a critical security flaw impacting Ivanti Connect Secure, Policy Secure, and ZTA Gateways has come under active exploitation in the wild beginning mid-December 2024. The security vulnerability in question is CVE-2025-0282 (CVSS score: 9.0), a stack-based buffer overflow that affects Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2″}]]  – Read More  –...

0

CISA Adds One Vulnerability to the KEV Catalog  – CISA

[[{“value”:” CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-0282 Ivanti Connect Secure Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. CISA urges organizations to apply mitigations as set forth in the CISA instructions linked below to include conducting...

0

Ivanti Releases Security Updates for Connect Secure, Policy Secure, and ZTA Gateways  – CISA

[[{“value”:” Ivanti released security updates to address vulnerabilities (CVE-2025-0282, CVE-2025-0283) in Ivanti Connect Secure, Policy Secure, and ZTA Gateways. A cyber threat actor could exploit CVE-2025-0282 to take control of an affected system. CISA has added CVE-2025-0282 to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CISA urges organizations to hunt for any malicious activity, report any positive...

0

Malicious hackers have their own shadow IT problem – djohnson

[[{“value”:” Every chief information security officer worth their salt spends time thinking about the problem of shadow IT in their enterprise. Systems, hardware or infrastructure that might have been connected to your network years ago, for reasons no one can remember, were then summarily forgotten until years later when they become an entry point in a data breach or compromise....

0

Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of various malspam campaigns. Faking the sender address of an email is widely seen as an attempt to make the digital missive more legitimate and get past security mechanisms that could otherwise flag it as malicious. While there are safeguards...

0

Microsoft moves to disrupt hacking-as-a-service scheme that’s bypassing AI safety measures – djohnson

– [[{“value”:” Microsoft is petitioning a Virginia court to seize software and shut down internet infrastructure that they allege is being used by a group of foreign cybercriminals to bypass safety guidelines for generative AI systems. In a filing with the Eastern District Court of Virginia, Microsoft brought a lawsuit against ten individuals for using stolen credentials and custom software...

0

ZDI Threat Hunting 2024: Highlights, Trends, & Challenges – Peter Girnus

– Reflecting on 2024, it has been an eventful year for the Zero Day Initiative Threat Hunting team. Throughout the year, we identified numerous threat actor campaigns exploiting zero-day vulnerabilities, uncovered additional variants of these vulnerabilities, and discovered even more vulnerabilities through our in-the-wild research. In this blog, we will highlight some of the key achievements of the Zero Day...

0

Researchers Expose NonEuclid RAT Using UAC Bypass and AMSI Evasion Techniques – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have shed light on a new remote access trojan called NonEuclid that allows bad actors to remotely control compromised Windows systems. “The NonEuclid remote access trojan (RAT), developed in C#, is a highly sophisticated malware offering unauthorised remote access with advanced evasion techniques,” Cyfirma said in a technical analysis published last week. “It employs”}]]  – Read More ...

0

Top 5 Malware Threats to Prepare Against in 2025 – [email protected] (The Hacker News)

– 2024 had its fair share of high-profile cyber attacks, with companies as big as Dell and TicketMaster falling victim to data breaches and other infrastructure compromises. In 2025, this trend will continue. So, to be prepared for any kind of malware attack, every organization needs to know its cyber enemy in advance. Here are 5 common malware families that...

0

Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks – [email protected] (The Hacker News)

– [[{“value”:”A Mirai botnet variant has been found exploiting a newly disclosed security flaw impacting Four-Faith industrial routers since early November 2024 with the goal of conducting distributed denial-of-service (DDoS) attacks. The botnet maintains approximately 15,000 daily active IP addresses, with the infections primarily scattered across China, Iran, Russia, Turkey, and the United States.”}]]  – Read More  – The Hacker...

0

FCC Launches ‘Cyber Trust Mark’ for IoT Devices to Certify Security Compliance – [email protected] (The Hacker News)

– [[{“value”:”The U.S. government on Tuesday announced the launch of the U.S. Cyber Trust Mark, a new cybersecurity safety label for Internet-of-Things (IoT) consumer devices. “IoT products can be susceptible to a range of security vulnerabilities,” the U.S. Federal Communications Commission (FCC) said. “Under this program, qualifying consumer smart products that meet robust cybersecurity standards will bear”}]]  – Read More ...

0

Google’s Willow Quantum Chip and Its Potential Threat to Current Encryption Standards – [email protected]

– [[{“value”:” Introduction: Google’s recent announcement of their Willow quantum processor marks a significant advancement in quantum computing technology while raising questions about the security and sustainability of current encryption methods. As quantum computers grow more powerful, cybersecurity experts grow increasingly concerned about their potential to break widely used encryption standards that protect sensitive data worldwide. Quantum vs. Traditional Computing:...

0

CISA Flags Critical Flaws in Mitel and Oracle Systems Amid Active Exploitation – [email protected] (The Hacker News)

– [[{“value”:”The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three flaws impacting Mitel MiCollab and Oracle WebLogic Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2024-41713 (CVSS score: 9.1) – A path traversal vulnerability in Mitel MiCollab that could allow an attacker”}]]  – Read...

0

National Cyber Director Harry Coker looks back (and ahead) on the Cyber Director office – Tim Starks

– [[{“value”:” Days after the four-year anniversary of the creation of the Office of the National Cyber Director and days before its current chief is set to depart, that man, Harry Coker Jr., looked both backward and forward at the office in a speech Tuesday and a separate interview with CyberScoop. Coker touched on software liability, regulations, the authorities of...

0

A Day in the Life of a Prolific Voice Phishing Crew – BrianKrebs

– [[{“value”:” Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never reach out unbidden to users this way. However, new details about the internal operations of a prolific voice phishing gang show the group routinely abuses legitimate services at Apple and Google to force a variety of outbound communications...

0

The AI Fix #32: Agentic AI, killer robot fridges, and the robosexual revolution – Graham Cluley

– [[{“value”:”In episode 32 of The AI Fix, our hosts learn the meaning of “poronkusema”, Mark discovers his dream job, a school tries using AI instead of teachers, the “Godfather of AI” says AI will see us as toddlers, and Graham lifts the lid on the hidden threat of killer robot fridges. Mark explains why 2025 is the year of...

0

White House launches cybersecurity label program for consumers – Greg Otto

– [[{“value”:” The White House announced Tuesday the official launch of the U.S. Cyber Trust Mark, a cybersecurity labeling initiative aimed at enhancing the security of internet-connected devices.  The initiative tackles rising consumer concerns about the security vulnerabilities of “smart” devices essential to modern homes. As households become more dependent on interconnected gadgets — with a 2023 Deloitte study revealing...

0

Android patches several vulnerabilities in first security update of 2025 – Greg Otto

– [[{“value”:” Android has released its first security update of the year, disclosing several critical and high-severity vulnerabilities that affect a wide range of Android devices.  The bulletin identifies five critical remote code execution (RCE) vulnerabilities affecting what Android categorizes as the “system,” which encompasses Android’s core components and underlying architecture. These vulnerabilities could allow attackers to execute code without...

0

CISA Adds Three Known Exploited Vulnerabilities to Catalog – CISA

[[{“value”:” CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-41713 Mitel MiCollab Path Traversal Vulnerability CVE-2024-55550 Mitel MiCollab Path Traversal Vulnerability CVE-2020-2883 Oracle WebLogic Server Unspecified Vulnerability Users and administrators are also encouraged to review the Palo Alto Threat Brief: Operation Lunar Peek related to CVE-2024-0012, the Palo Alto Security Bulletin for CVE-2024-0012, and...

0

CISA Releases Two Industrial Control Systems Advisories – CISA

[[{“value”:” CISA released two Industrial Control Systems (ICS) advisories on January 7, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-007-01 ABB ASPECT-Enterprise, NEXUS, and MATRIX Series Products ICSA-25-007-02 Nedap Librix Ecoreader CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations. “}]]    – Read More – All...

0

ABB ASPECT-Enterprise, NEXUS, and MATRIX Series Products – CISA

[[{“value”:” View CSAF 1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: ABB Equipment: ASPECT-Enterprise, NEXUS, and MATRIX series Vulnerabilities: Files or Directories Accessible to External Parties, Improper Validation of Specified Type of Input, Cleartext Transmission of Sensitive Information, Cross-site Scripting, Server-Side Request Forgery (SSRF), Improper Neutralization of Special Elements in Data Query Logic, Allocation of Resources...

0

Nedap Librix Ecoreader – CISA

[[{“value”:” View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/Low attack complexity Vendor: Nedap Librix Equipment: Ecoreader Vulnerability: Missing Authentication for Critical Function 2. RISK EVALUATION Successful exploitation of this vulnerability could result in remote code execution. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Ecoreader are affected: Ecoreader: All versions 3.2 VULNERABILITY OVERVIEW 3.2.1 MISSING...

0

Researchers Uncover Major Security Flaw in Illumina iSeq 100 DNA Sequencers – [email protected] (The Hacker News)

– [[{“value”:”Cybersecurity researchers have uncovered firmware security vulnerabilities in the Illumina iSeq 100 DNA sequencing instrument that, if successfully exploited, could permit attackers to brick or plant persistent malware on susceptible devices. “The Illumina iSeq 100 used a very outdated implementation of BIOS firmware using CSM [Compatibility Support Mode] mode and without Secure Boot or standard”}]]  – Read More  –...

0

Farewell to the Fallen: The Cybersecurity Stars We Lost Last Year – [email protected] (The Hacker News)

– It’s time once again to pay our respects to the once-famous cybersecurity solutions whose usefulness died in the past year. The cybercriminal world collectively mourns the loss of these solutions and the easy access they provide to victim organizations. These solutions, though celebrated in their prime, succumbed to the twin forces of time and advancing threats. Much like a...