Posted by Apple Product Security via Fulldisclosure on May 16 APPLE-SA-05-12-2025-9 Safari 18.5 Safari 18.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/122719. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. WebKit Available for: macOS Ventura and macOS Sonoma Impact: … Read More “APPLE-SA-05-12-2025-9 Safari 18.5 – Full Disclosure” »
Posted by Ron E on May 16 A persistent cross-site scripting (XSS) vulnerability exists in gugoan’s Economizzer v.0.9-beta1 The application fails to properly sanitize user-supplied input when creating a new cash book entry via the *cashbook/create* endpoint. An attacker can inject malicious JavaScript payloads that are permanently stored and later executed in the context … Read More “Persistent Cross-Site Scripting in Economizzer Cashbook Entry – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 16 APPLE-SA-05-12-2025-5 macOS Ventura 13.7.6 macOS Ventura 13.7.6 addresses the following issues. Information about the security content is also available at https://support.apple.com/122718. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. afpfs Available for: macOS Ventura Impact: Mounting … Read More “APPLE-SA-05-12-2025-5 macOS Ventura 13.7.6 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 16 APPLE-SA-05-12-2025-6 watchOS 11.5 watchOS 11.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/122722. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. AppleJPEG Available for: Apple Watch Series 6 and later … Read More “APPLE-SA-05-12-2025-6 watchOS 11.5 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 16 APPLE-SA-05-12-2025-7 tvOS 18.5 tvOS 18.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/122720. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. AppleJPEG Available for: Apple TV HD and Apple TV … Read More “APPLE-SA-05-12-2025-7 tvOS 18.5 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 16 APPLE-SA-05-12-2025-2 iPadOS 17.7.7 iPadOS 17.7.7 addresses the following issues. Information about the security content is also available at https://support.apple.com/122405. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. AirDrop Available for: iPad Pro 12.9-inch 2nd generation, iPad … Read More “APPLE-SA-05-12-2025-2 iPadOS 17.7.7 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 16 APPLE-SA-05-12-2025-3 macOS Sequoia 15.5 macOS Sequoia 15.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/122716. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. afpfs Available for: macOS Sequoia Impact: Connecting … Read More “APPLE-SA-05-12-2025-3 macOS Sequoia 15.5 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 16 APPLE-SA-05-12-2025-4 macOS Sonoma 14.7.6 macOS Sonoma 14.7.6 addresses the following issues. Information about the security content is also available at https://support.apple.com/122717. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. afpfs Available for: macOS Sonoma Impact: Connecting … Read More “APPLE-SA-05-12-2025-4 macOS Sonoma 14.7.6 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on May 16 APPLE-SA-05-12-2025-1 iOS 18.5 and iPadOS 18.5 iOS 18.5 and iPadOS 18.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/122404. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. AppleJPEG Available for: … Read More “APPLE-SA-05-12-2025-1 iOS 18.5 and iPadOS 18.5 – Full Disclosure” »
Posted by CVE – VULSec Labs via Fulldisclosure on May 16 === SUMMARY === Vendor: ArcGIS Product: ArcGIS Subject: ArcGIS Hidden Functionality Allows Insecure OAuth 2.0 Based Authentication – CVE-2025-0020 VSL-2025-21 CVSS: 7.9 (high) CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/U:Amber Credit: Erez Kalman Author: VULSec Labs Date: 2025-05-14 === DETAILS === CWE/CAPEC: Violation of Secure Design Principles, Hidden Functionality, Incorrect Provision … Read More “ArcGIS Hidden Functionality Allows Insecure OAuth 2.0 Based Authentication – CVE-2025-0020 VSL-2025-21 – Full Disclosure” »
Posted by Flo Schäfer via Fulldisclosure on May 16 secuvera-SA-2025-01: Privilege Escalation Affected Products Automic Automation Agent Unix <24.3.0 HF4, <21.0.13 HF1 References secuvera-SA-2025-01 CVE not assigned yet CWE-426: Untrusted Search Path CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L Summary: An agent configured to run in privileged mode using the SetUID-Bit can be used to escalate privileges, by supplying an … Read More “secuvera-SA-2025-01: Privilege Escalation in Automic Automation Agent Unix – Full Disclosure” »
Posted by Egidio Romano on May 16 ————————————————————————— Invision Community <= 5.0.6 (customCss) Remote Code Execution Vulnerability ————————————————————————— [-] Software Link: https://invisioncommunity.com [-] Affected Versions: All versions from 5.0.0 to 5.0.6. [-] Vulnerability Description: The vulnerability is located in the… – Read More – Full Disclosure
You’ve got an important choice to make: HubSpot or Salesforce? – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The beginning of Pwn2Own Berlin 2025, hosted at the OffensiveCon conference, has concluded its first two days with… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The post DOGE could scrap identity protections for those impacted by OPM breach, senator warns appeared first on CyberScoop. – Read More – CyberScoop
When Donald Trump was on the campaign trail, he argued that coordination by the Biden administration and social media companies on disinformation during the COVID-19 pandemic and elections amounted to political censorship. He claimed that supposed censorship stifled the free and unencumbered exchange of ideas essential to democracy, and posed a clear threat to the … Read More “FCC commissioner blasts Trump administration censorship policies – CyberScoop” »
ReversingLabs discovers dbgpkg, a fake Python debugger that secretly backdoors systems to steal data. Researchers suspect a pro-Ukraine… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Ivanti EPMM users urgently need to patch against actively exploited 0day vulnerabilities (CVE-2025-4427, CVE-2025-4428) that enable pre-authenticated remote… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Coinbase responded to a security incident with combative measures Thursday after the company said cybercriminals bribed some of the cryptocurrency exchange’s international support staff to steal data on customers. The unnamed threat group stole personally identifiable information and other sensitive data on less than 1% of Coinbase’s monthly users, the company said in a blog … Read More “Coinbase flips $20M extortion demand into bounty for info on attackers – CyberScoop” »
The message was consistent at a House cybersecurity hearing Thursday: pass legislation extending an expiring information-sharing law before it lapses in September, and worry about improving it later. Both lawmakers and witnesses at the hearing of the Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection shared that view about the pending expiration of the 2015 … Read More “Consensus forms on reauthorizing 2015 cyber info-sharing law now, upgrading it later – CyberScoop” »
An NCSC assessment highlighting the impacts on cyber threat from AI developments between now and 2027. – Read More – NCSC Feed
Ascension, one of the largest private healthcare companies in the United States, has confirmed that the personal data of some 437,329 patients has been exposed following an attack by cybercriminals. Read more in my article on the Fortra blog. – Read More – Graham Cluley
Quantum computing is on the verge of revolutionizing the technology landscape, much like AI did in 2024. By the end of 2025, quantum computing will emerge as a defining force, ushering in a new era filled with both unprecedented opportunities and significant challenges in securing digital assets. While state-of-the-art quantum computers aren’t yet capable of … Read More “Preparing for the post-quantum era: a CIO’s guide to securing the future of encryption – CyberScoop” »
The FBI has warned about an ongoing smishing and vishing scheme using AI deepfakes to impersonate US officials – Read More –
New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors – The Hacker News
Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been used to primarily single out the gaming industry, as well as technology companies and educational institutions in China. “Over the past few months, it has expanded aggressively, continuously leveraging infected devices to launch external attacks,” NSFOCUS said in a report … Read More “New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors – The Hacker News” »
Hackers from the Scattered Spider group, known for UK retail attacks, are now targeting US retailers, Google cybersecurity… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
An analysis by Robert Walters found there are around 17,000 cybersecurity vacancies in the UK currently, with organizations struggling to fill open positions – Read More –
Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyber threats evolving rapidly and data privacy regulations tightening, organizations must stay vigilant and proactive to safeguard their most valuable assets. But how do you build an effective data protection framework? In this article, we’ll explore data protection best … Read More “Top 10 Best Practices for Effective Data Protection – The Hacker News” »
In Operation RoundPress, the compromise vector is a spearphishing email leveraging an XSS vulnerability to inject malicious JavaScript code into the victim’s webmail page – Read More –
Welcome to the second day of our first ever Pwn2OwnBerlin. Yesterday, we awarded $260,000 for some amazing research. Today looks to be even better, with more AI on the line, plus SharePoint and VMware ESXi. As always, we’ll be updating this blog with results as we have them. COLLISION – Mohand Acherir & Patrick Ventuzelo … Read More “Pwn2Own Berlin 2025: Day Two Results – Zero Day Initiative – Blog” »
Researchers at ETH Zürich have discovered yet another security flaw that they say impacts all modern Intel CPUs and causes them to leak sensitive data from memory, showing that the vulnerability known as Spectre continues to haunt computer systems after more than seven years. The vulnerability, referred to as Branch Privilege Injection (BPI), “can be … Read More “Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks – The Hacker News” »
New data from Darktrace showed that cyber-attacks targeting healthcare organizations increased in intensity in 2024 – Read More –
Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos RAT. “Threat actors delivered malicious LNK files embedded within ZIP archives, often disguised as Office documents,” Qualys security researcher Akshay Thorve said in a technical report. “The attack chain … Read More “Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks – The Hacker News” »
Modern apps move fast—faster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late to cloud threats, and monitor SOC alerts only after damage is done. Attackers don’t wait. They exploit vulnerabilities within hours. Yet most organizations take days … Read More “[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications – The Hacker News” »
The head of the Federal Trade Commission described to lawmakers Thursday new technology, personnel and infrastructure the agency needs as it prepares to implement and enforce the Take It Down Act, placing the FTC’s enforcement wing at the forefront of the fight against nonconsensual deepfake pornography. The FTC’s proposed budget holds funding at $425.7 million, … Read More ” FTC wants a new, segregated software system to police deepfake porn – CyberScoop” »
Proofpoint has entered into an agreement to acquire Hornetsecurity Group, a Germany-based provider of Microsoft 365 security services, in a deal reportedly valued at more than $1 billion. The acquisition, described as the largest in Proofpoint’s history, comes amid accelerating consolidation in the cybersecurity industry as companies seek to broaden their offerings to enterprise customers … Read More “Proofpoint to acquire Hornetsecurity for over $1 billion – CyberScoop” »
A vulnerability has been discovered in Google Chrome which could allow for arbitrary code execution. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create … Read More “A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
In what experts are calling a novel legal outcome, the 22-year-old former administrator of the cybercrime community Breachforums will forfeit nearly $700,000 to settle a civil lawsuit from a health insurance company whose customer data was posted for sale on the forum in 2023. Conor Brian Fitzpatrick, a.k.a. “Pompompurin,” is slated for resentencing next month … Read More “Breachforums Boss to Pay $700k in Healthcare Breach – Krebs on Security” »
The FBI said Thursday that malicious actors have been impersonating senior U.S. government officials in a text and voice messaging campaign, using phishing texts and AI-generated audio to trick other government officials into giving up access to their personal accounts. The warning provided few details about the campaign, which started in April and appears to … Read More “FBI warns of fake texts, deepfake calls impersonating senior U.S. officials – CyberScoop” »
Coinbase insider breach: Bribed overseas agents stole user data; company rejects ransom, offers $20M reward, boosts security, and… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Exploitable from adjacent … Read More “Siemens SCALANCE LPE9403 – All CISA Advisories” »
Hundreds of victims are surfacing across the world from zero-day cyberattacks on Europe’s biggest software manufacturer and company, in a campaign that one leading cyber expert is comparing to the vast Chinese government-linked Salt Typhoon and Volt Typhoon breaches of critical infrastructure. The zero-days — vulnerabilities previously unknown to researchers or companies, but that malicious … Read More “SAP cyberattack widens, drawing Salt Typhoon and Volt Typhoon comparisons – CyberScoop” »
Austrian privacy non-profit noyb (none of your business) has sent Meta’s Irish headquarters a cease-and-desist letter, threatening the company with a class action lawsuit if it proceeds with its plans to train users’ data for training its artificial intelligence (AI) models without an explicit opt-in. The move comes weeks after the social media behemoth announced … Read More “Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit – The Hacker News” »
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack … Read More “Siemens SIRIUS 3SK2 Safety Relays and 3RK3 Modular Safety Systems – All CISA Advisories” »
Multiple vulnerabilities have been discovered in Ivanti Endpoint Manager Mobile, the most severe of which could allow for remote code execution. Ivanti Endpoint Manager Mobile (EPMM) is a unified endpoint management solution that enables organizations to securely manage and monitor mobile devices, applications, and content across multiple platforms from a centralized interface. Successful exploitation of … Read More “Multiple Vulnerabilities in Ivanti Endpoint Manager Mobile Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
A new wave of attacks uses PowerShell and LNK files to secretly install Remcos RAT, enabling full remote… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Reddit Struggles After Google’s New Focus on Expertise – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
CISA released twenty-two Industrial Control Systems (ICS) advisories on May 15, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-135-01 Siemens RUGGEDCOM APE1808 Devices ICSA-25-135-02 Siemens INTRALOG WMS ICSA-25-135-03 Siemens BACnet ATEC Devices ICSA-25-135-04 Siemens Desigo ICSA-25-135-05 Siemens SIPROTEC and SICAM ICSA-25-135-06 Siemens Teamcenter Visualization ICSA-25-135-07 Siemens IPC … Read More “CISA Releases Twenty-Two Industrial Control Systems Advisories – All CISA Advisories” »
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 2.1 ATTENTION: Exploitable remotely Vendor: … Read More “Siemens Mendix OIDC SSO – All CISA Advisories” »
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable from adjacent … Read More “Siemens VersiCharge AC Series EV Chargers – All CISA Advisories” »