Author: Joe-W

0

Data Leak Exposes TopSec’s Role in China’s Censorship-as-a-Service Operations  – The Hacker News

An analysis of a data leak from a Chinese cybersecurity company TopSec has revealed that it likely offers censorship-as-a-service solutions to prospective customers, including a state-owned enterprise in the country. Founded in 1995, TopSec ostensibly offers services such as Endpoint Detection and Response (EDR) and vulnerability scanning. But it’s also providing “boutique” solutions in order  – Read More  – The...

0

Apple Drops iCloud’s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands  – The Hacker News

Apple is removing its Advanced Data Protection (ADP) feature for iCloud from the United Kingdom with immediate effect following government demands for backdoor access to encrypted user data. The development was first reported by Bloomberg. ADP for iCloud is an optional setting that ensures that users’ trusted devices retain sole access to the encryption keys used to unlock data stored...

0

No, that’s not the acting head of the Social Security Administration. That’s a former CISA employee.  – CyberScoop

A longtime former employee of the Cybersecurity and Infrastructure Security Agency, an agency in the midst of curtailing its anti-misinformation and disinformation work under President Donald Trump, has found himself being misidentified online as a key figure in another Trump administration battle. On social media and in some news outlets, Ross Foard, a former CISA information security specialist, is being...

0

Apple removes advanced data protection tool after UK government request  – Data and computer security | The Guardian

Users will now be more vulnerable to data breaches from bad actors, Apple says, after Home Office order Business live – latest updates Apple has taken the unprecedented step of removing its strongest data security tool from customers in the UK, after the government demanded “backdoor” access to user data. UK users will no longer have access to the advanced...

0

CISA Adds One Known Exploited Vulnerability to Catalog  – All CISA Advisories

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-24989 Microsoft Power Pages Improper Access Control Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known...

0

Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3  – The Hacker News

The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform appear to be readying a new version that allows prospective customers and cyber crooks to clone any brand’s legitimate website and create a phishing version, further bringing down the technical expertise required to pull off phishing attacks at scale. The latest iteration of the phishing suite “represents a significant  – Read...

0

Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025  – The Hacker News

In today’s rapidly evolving digital landscape, weak identity security isn’t just a flaw—it’s a major risk that can expose your business to breaches and costly downtime. Many organizations are overwhelmed by an excess of user identities and aging systems, making them vulnerable to attacks. Without a strategic plan, these security gaps can quickly turn into expensive liabilities. Join us for...

0

AI-Powered Deception is a Menace to Our Societies  – The Hacker News

Wherever there’s been conflict in the world, propaganda has never been far away. Travel back in time to 515 BC and read the Behistun Inscription, an autobiography by Persian King Darius that discusses his rise to power. More recently, see how different newspapers report on wars, where it’s said, ‘The first casualty is the truth.’  While these forms of communication ...

0

CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks  – The Hacker News

A high-severity security flaw impacting the Craft content management system (CMS) has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-23209 (CVSS score: 8.1), which impacts Craft CMS versions 4 and 5. It was addressed by the  – Read...

0

Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks  – The Hacker News

Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by likely abusing a known security flaw tracked as CVE-2018-0171, and by obtaining legitimate victim login credentials as part of a targeted campaign aimed at major U.S. telecommunications companies. “The threat actor then demonstrated their ability to persist in target environments across equipment from multiple  –...

0

Python’s official documentation contains textbook example of insecure code (XSS)  – Full Disclosure

  Posted by Georgi Guninski on Feb 20 Python’s official documentation contains textbook example of insecure code (XSS) Date: 2025-02-18 Author: Georgi Guninski === form = cgi.FieldStorage() if “name” not in form or “addr” not in form: print(“<H1>Error</H1>”) print(“Please fill in the name and addr fields.”) return print(“<p>name:”, form[“name”].value) print(“<p>addr:”,… – Read More  – Full Disclosure 

0

Self Stored XSS – acp2sev7.2.2  – Full Disclosure

  Posted by Andrey Stoykov on Feb 20 # Exploit Title: Self Stored XSS – acp2sev7.2.2 # Date: 02/2025 # Exploit Author: Andrey Stoykov # Version: 7.2.2 # Tested on: Ubuntu 22.04 # Blog: https://msecureltd.blogspot.com/2025/02/friday-fun-pentest-series-19-self.html Self Stored XSS #1: Steps to Reproduce: 1. Visit “http://192.168.58.168/acp2se/mul/muladmin.php&quot; and login with “admin” / “adminpass” 2. In the field “Put the name of the...

0

MitM attack against OpenSSH’s VerifyHostKeyDNS-enabled client  – Full Disclosure

  Posted by Qualys Security Advisory via Fulldisclosure on Feb 20 Qualys Security Advisory CVE-2025-26465: MitM attack against OpenSSH’s VerifyHostKeyDNS-enabled client CVE-2025-26466: DoS attack against OpenSSH’s client and server ======================================================================== Contents ======================================================================== Summary Background Experiments Results MitM attack against OpenSSH’s VerifyHostKeyDNS-enabled client DoS… – Read More  – Full Disclosure 

0

Salt Typhoon gained initial access to telecoms through Cisco devices  – CyberScoop

Salt Typhoon gained initial access to Cisco devices as part of the Chinese nation-state threat group’s sweeping attacks on U.S. telecom networks, the company confirmed Thursday in a threat intelligence report. Cisco Talos, the networking vendor’s threat intelligence unit, said it observed one instance where Salt Typhoon likely exploited a seven-year-old critical vulnerability in Cisco IOS XE (CVE-2018-0171). Yet, researchers...

0

SEC rebrands cryptocurrency unit to focus on emerging technologies   – CyberScoop

The Securities and Exchange Commission announced Thursday that it was changing its Crypto Assets and Cyber Unit to the “Cyber and Emerging Technologies Unit.” The regulator said its new unit will “focus on combatting cyber-related misconduct and to protect retail investors from bad actors in the emerging technologies space.” The newly rebranded unit will be composed of approximately 30 fraud...

0

CISA Releases Eight Industrial Control Systems Advisories  – All CISA Advisories

CISA released eight Industrial Control Systems (ICS) advisories on February 20, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-051-01 ABB ASPECT-Enterprise, NEXUS, and MATRIX Series ICSA-25-051-02 ABB FLXEON Controllers ICSA-25-051-03 Carrier Block Load ICSA-25-051-04 Siemens SiPass Integrated ICSA-25-051-05 Rapid Response Monitoring My Security Account App ICSA-25-051-06 Elseta Vinci Protocol Analyzer  ICSA-24-291-03 Mitsubishi...

0

ABB ASPECT-Enterprise, NEXUS, and MATRIX Series  – All CISA Advisories

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: ABB Equipment: ASPECT-Enterprise, NEXUS, and MATRIX series Vulnerability: Use of Hard-coded Credentials 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to obtain access to devices without proper authentication. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS ABB reports the following products are affected: ABB...

0

Siemens SiPass Integrated  – All CISA Advisories

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: SiPass...

0

ABB FLXEON Controllers  – All CISA Advisories

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: ABB Equipment: FLXEON Controllers Vulnerabilities: Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’), Missing Origin Validation in WebSockets, Insertion of Sensitive Information into Log File 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to send unauthorized...

0

Medixant RadiAnt DICOM Viewer  – All CISA Advisories

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 5.7 ATTENTION: Low attack complexity Vendor: Medixant Equipment: RadiAnt DICOM Viewer Vulnerability: Improper Certificate Validation 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to perform a machine-in-the-middle attack (MITM), resulting in malicious updates being delivered to the user. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Medixant products are...

0

Rapid Response Monitoring My Security Account App  – All CISA Advisories

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rapid Response Monitoring Equipment: My Security Account App Vulnerability: Authorization Bypass Through User-Controlled Key 2. RISK EVALUATION Successful exploitation of this vulnerability could allow attacker to access sensitive information of other users. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Rapid Response Monitoring products are affected:...

0

Elseta Vinci Protocol Analyzer  – All CISA Advisories

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.4 ATTENTION: Exploitable remotely/low attack complexity Vendor: Elseta Equipment: Vinci Protocol Analyzer Vulnerability: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to escalate privileges and perform code execution on the affected system. 3. TECHNICAL DETAILS 3.1...

0

North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware  – The Hacker News

Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret. The activity, linked to North Korea, has been codenamed DeceptiveDevelopment, which overlaps with clusters tracked under the names Contagious Interview (aka CL-STA-0240), DEV#POPPER, Famous Chollima,  – Read More  – The Hacker News 

0

Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives  – The Hacker News

A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. “The legitimate application used in the attack, jarsigner, is a file created during the installation of the IDE package distributed by the Eclipse Foundation,” the AhnLab SEcurity Intelligence Center (ASEC)  – Read More ...

0

Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware  – The Hacker News

A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with the intrusions ultimately leading to deployment of a ransomware called NailaoLocker in some cases. The campaign, codenamed Green Nailao by Orange Cyberdefense CERT, involved the exploitation of a new-patched security flaw  – Read More  – The Hacker...

0

PCI DSS 4.0 Mandates DMARC By 31st March 2025  – The Hacker News

The payment card industry has set a critical deadline for businesses handling cardholder data or processing payments- by March 31, 2025, DMARC implementation will be mandatory! This requirement highlights the importance of preventative measures against email fraud, domain spoofing, and phishing in the financial space. This is not an optional requirement as non-compliance may result in monetary  – Read More ...

0

Microsoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now  – The Hacker News

For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and collaboration for organizations worldwide. Whether deployed on-premises or in hybrid environments, companies of all sizes rely on Exchange for seamless internal and external communication, often integrating it deeply with their workflows, compliance policies and security frameworks  – Read More  – The Hacker News 

0

Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability  – The Hacker News

Citrix has released security updates for a high-severity security flaw impacting NetScaler Console (formerly NetScaler ADM) and NetScaler Agent that could lead to privilege escalation under certain conditions. The vulnerability, tracked as CVE-2024-12284, has been given a CVSS v4 score of 8.8 out of a maximum of 10.0 It has been described as a case of improper privilege management that...

0

Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability  – The Hacker News

Microsoft has released security updates to address two Critical-rated flaws impacting Bing and Power Pages, including one that has come under active exploitation in the wild. The vulnerabilities are listed below – CVE-2025-21355 (CVSS score: 8.6) – Microsoft Bing Remote Code Execution Vulnerability CVE-2025-24989 (CVSS score: 8.2) – Microsoft Power Pages Elevation of Privilege Vulnerability ”  – Read More  –...

0

Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability  – The Hacker News

Citrix has released security updates for a high-severity security flaw impacting NetScaler Console (formerly NetScaler ADM) and NetScaler Agent that could lead to privilege escalation under certain conditions. The vulnerability, tracked as CVE-2024-12284, has been given a CVSS v4 score of 8.8 out of a maximum of 10.0 It has been described as a case of improper privilege management that...

0

Russia-aligned threat groups dupe Ukrainian targets via Signal  – CyberScoop

Russian state threat groups have compromised Signal accounts used by Ukrainian military and government personnel to eavesdrop on real-time communications, Google Threat Intelligence Group said in a report released Wednesday. “This is a persistent, ongoing campaign being carried out by multiple different Russia-aligned threat actors,” Dan Black, principal analyst at Google Threat Intelligence Group, said in an email to CyberScoop....

0

Energy CISO: Agencies can’t implement zero trust alone  – CyberScoop

Federal agencies need help from stakeholders outside of government to solve some of the harder technical barriers in setting up zero-trust architecture in their networks, the Department of Energy’s chief information security officer said Wednesday. Speaking at CyberScoop’s Zero Trust Summit in Washington D.C., Paul Selby urged technology manufacturers and experts to work with federal agencies to develop technologies and...

0

Salt Typhoon telecom breach remarkable for its ‘indiscriminate’ targeting, FBI official says  – CyberScoop

One of the most notable elements of the monumental hack of major telecommunications companies is just how “indiscriminate” it was in its pursuit of data, a top FBI official said Wednesday. The FBI has been investigating the breach, which it has blamed on Chinese government hackers commonly known as Salt Typhoon. “What we found particularly remarkable in our investigation is...