Author: Joe-W

0

To Catch A Thief | Rubrik  – CyberScoop

For this special live recording of To Catch a Thief at The New York Stock Exchange, host and former lead cybersecurity and digital espionage reporter for The New York Times, Nicole Perlroth sits down with those who have been directly targeted by, traced, or directly engaged China’s state-sponsored hackers, diplomatically, or in the cyber domain: Pulitzer Prize winning journalist David...

0

House bill seeks better tech to combat financial fraud scams against elderly  – CyberScoop

A bipartisan trio of House lawmakers is pushing a bill that would give law enforcement more resources to tackle financial fraud, pig butchering and other scams that specifically target older Americans. The Guarding Unprotected Aging Retirees from Deception (GUARD) Act from Reps. Zach Nunn, R-Iowa, Josh Gottheimer, D-N.J., and Scott Fitzgerald, R-Wis., would give state, local and tribal enforcement agencies...

0

SAP zero-day vulnerability under widespread active exploitation  – CyberScoop

Threat hunters and security researchers have observed widespread exploitation of a zero-day vulnerability affecting SAP NetWeaver systems. The unrestricted file upload vulnerability — CVE-2025-31324 — has a base score of 10 on the CVSS scale and allows attackers to upload files directly to the system without authorization.  The software defect, which affects the SAP Visual Composer component for SAP NetWeaver,...

0

North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures  – The Hacker News

North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. “In this new campaign, the threat actor group is using three front companies in the cryptocurrency consulting industry—BlockNovas LLC (blocknovas[.] com), Angeloper Agency (angeloper[.]com), and SoftGlide LLC (softglide[.]co)—to spread  – Read More  – The Hacker News 

0

Why NHIs Are Security’s Most Dangerous Blind Spot  – The Hacker News

When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking beneath the surface is a growing threat that does not involve human credentials at all, as we witness the exponential growth of Non-Human Identities (NHIs).  At the top of mind when NHIs are mentioned, most security teams immediately think of...

0

SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers  – The Hacker News

Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and code execution.  “The exploitation is likely tied to either a previously disclosed vulnerability like CVE-2017-9844 or an unreported remote file inclusion (RFI) issue,” ReliaQuest said in a report published this week. The cybersecurity  – Read...

0

Hackers access sensitive SIM card data at South Korea’s largest telecoms company  – Graham Cluley

Mobile network operator SK Telecom, which serves approximately 34 million subscribers in South Korea, has confirmed that it suffered a cyber attack earlier this month that saw malware infiltrate its internal systems, and access data related to customers’ SIM cards. Read more in my article on the Hot for Security blog.  – Read More  – Graham Cluley 

0

DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks  – The Hacker News

Cybersecurity researchers are warning about a new malware called DslogdRAT that’s installed following the exploitation of a now-patched security flaw in Ivanti Connect Secure (ICS). The malware, along with a web shell, were “installed by exploiting a zero-day vulnerability at that time, CVE-2025-0282, during attacks against organizations in Japan around December 2024,” JPCERT/CC researcher Yuma  – Read More  – The...

0

Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers  – The Hacker News

Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully exploited, could enable attackers to gain unauthorized access to files, inject malicious data, and tamper with logs under certain conditions. The vulnerabilities, flagged by cybersecurity vendor OPSWAT, are listed below – CVE-2025-27610 (CVSS score: 7.5) – A path traversal  – Read More  –...

0

CISA gets new No. 2: Madhu Gottumukkala  – CyberScoop

The Cybersecurity and Infrastructure Security Agency will soon have a new second-in-command. Madhu Gottumukkala has been named deputy director. He comes over to CISA from his prior position in the South Dakota government, where Kristi Noem was most recently governor before taking over as secretary of the Department of Homeland Security. Gottumukkala had been commissioner of the Bureau of Information...

0

VulnCheck spotted 159 actively exploited vulnerabilities in first few months of 2025  – CyberScoop

Attackers exploited nearly a third of vulnerabilities within a day of CVE disclosure in the first quarter of 2025, VulnCheck said in a report released Thursday. The company, which focuses on vulnerability threat intelligence, identified 159 actively exploited vulnerabilities from 50 sources during the quarter. The time from CVE disclosure to evidence of exploitation in the first quarter was marginally...

0

AI speeds up analysis work for humans, two federal cyber officials say  – CyberScoop

Two federal cybersecurity officials said Thursday that they’re using — or contemplating using — artificial intelligence to conduct tasks that speed up the work of human analysts. AI is an important current and future contributor to a variety of security-related administrative jobs like accreditation and compliance, and for the Department of the Air Force as it undertakes modernization efforts, said...

0

Judge tosses citizenship provisions in Trump elections order  – CyberScoop

A federal court partially blocked a Trump administration executive order Thursday that seeks to impose requirements on states to use the White House’s definition of “documentary proof” of citizenship, inhibit mail voting and other election-related elements by threatening to withhold federal funding.  The order was subject to multiple lawsuits from Democratic Party organizations as well as civic groups like the...

0

CISA Releases Seven Industrial Control Systems Advisories  – All CISA Advisories

CISA released seven Industrial Control Systems (ICS) advisories on April 24, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-114-01 Schneider Electric Modicon Controllers ICSA-25-114-02 ALBEDO Telecom Net.Time – PTP/NTP Clock ICSA-25-114-03 Vestel AC Charger ICSA-25-114-04 Nice Linear eMerge E3 ICSA-25-114-05 Johnson Controls ICU ICSA-25-114-06 Planet Technology Network Products  ICSA-24-338-05 Fuji Electric Monitouch...

0

Vestel AC Charger  – All CISA Advisories

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Vestel Equipment: AC Charger Vulnerability: Exposure of Sensitive System Information to an Unauthorized Control Sphere 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker access to sensitive information, such as credentials which could subsequently enable them to cause a denial of service or...

0

Planet Technology Network Products  – All CISA Advisories

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/Low attack complexity Vendor: Planet Technology Equipment: Planet Technology Network Products Vulnerabilities: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’), Use of Hard-coded Credentials, Missing Authentication for Critical Function 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to read or manipulate...

0

Nice Linear eMerge E3  – All CISA Advisories

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Nice Equipment: Linear eMerge E3 Vulnerability: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to execute arbitrary OS commands. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of...

0

Johnson Controls ICU  – All CISA Advisories

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Johnson Controls Inc. Equipment: ICU Vulnerability: Stack-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Johnson Controls reports the following versions of ICU are affected: ICU: Versions prior to 6.9.5...

0

Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware  – The Hacker News

At least six organizations in South Korea have been targeted by the prolific North Korea-linked Lazarus Group as part of a campaign dubbed Operation SyncHole. The activity targeted South Korea’s software, IT, financial, semiconductor manufacturing, and telecommunications industries, according to a report from Kaspersky published today. The earliest evidence of compromise was first detected in  – Read More  – The...

0

Deep and Dark Web Scavenging  – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.

A Growing Threat and How Da Vinci helps Businesses Fight Back As businesses continue to digitise operations, sensitive data becomes increasingly vulnerable to exposure on hidden layers of the internet. Deep and dark web scavenging has emerged as a prominent tactic used by cybercriminals to exploit personal, corporate, and government data. While the deep web […] The post Deep and...

0

159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure  – The Hacker News

As many as 159 CVE identifiers have been flagged as exploited in the wild in the first quarter of 2025, up from 151 in Q4 2024. “We continue to see vulnerabilities being exploited at a fast pace with 28.3% of vulnerabilities being exploited within 1-day of their CVE disclosure,” VulnCheck said in a report shared with The Hacker News. This...

0

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools  – The Hacker News

Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring. This causes a “major blind spot in Linux runtime security tools,” ARMO said. “This mechanism allows a user application to perform various actions without using system calls,” the company said in  – Read More  –...

0

Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals  – The Hacker News

The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to their cybercrime suite with generative artificial intelligence (GenAI) capabilities. “This addition lowers the technical barrier for creating phishing pages, enabling less tech-savvy criminals to deploy customized scams in minutes,” Netcraft said in a new report shared with The Hacker News. ”  – Read More  – The...

0

Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely  – The Hacker News

A critical security flaw has been disclosed in the Commvault Command Center that could allow arbitrary code execution on affected installations. The vulnerability, tracked as CVE-2025-34028, carries a CVSS score of 9.0 out of a maximum of 10.0. “A critical security vulnerability has been identified in the Command Center installation, allowing remote attackers to execute arbitrary code without  – Read...

0

Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign  – The Hacker News

The Evolving Healthcare Cybersecurity Landscape  Healthcare organizations face unprecedented cybersecurity challenges in 2025. With operational technology (OT) environments increasingly targeted and the convergence of IT and medical systems creating an expanded attack surface, traditional security approaches are proving inadequate. According to recent statistics, the healthcare sector  – Read More  – The Hacker News 

AttackFeed by Joe Wagner
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.