Ransomware attacks surged dramatically in the first quarter of 2025, with a 126% increase compared to the same period in 2024, according to a newly released global cyber attack report. The consumer goods and services sector emerged as the primary…
Category: EN
Krebs throws himself on the grenade, resigns from SentinelOne after Trump revokes clearances
Illegitimi non carborundum? Nice password, Mr Ex-CISA Chris Krebs, the former head of the US Cybersecurity and Infrastructure Security Agency (CISA) and a longtime Trump target, has resigned from SentinelOne following a recent executive order that targeted him and revoked…
LummaStealer Exploits Windows Utility to Run Remote Code Disguised as .mp4 File
The Cybereason Global Security Operations Center (GSOC) has shed light on the sophisticated tactics used by the LummaStealer malware to evade detection and execute malicious code. Originally spotted in 2022, this Russian-developed malware-as-a-service (MaaS) has continuously evolved its evasion techniques…
43% of Top 100 Enterprise Mobile Apps Expose Sensitive Data to Hackers
A comprehensive study by zLabs, the research team at Zimperium, has found that over 43% of the top 100 mobile applications used in business environments contain severe vulnerabilities that expose sensitive data to potential hackers. This finding underscores the urgent…
Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024
The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in the number of vulnerabilities detected within Microsoft’s ecosystem, setting a new record with 1,360 vulnerabilities reported in 2024. This escalation marks the highest count since the…
Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis
A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as “Cascading Shadows” to deliver various malware, including Agent Tesla, XLoader, and Remcos RAT. The attackers’ strategy hinges on using multiple, seemingly simple but strategically layered stages,…
CVE-2024-13059: Exploiting Path Traversal in AnythingLLM for Remote Code Execution
Discover CVE-2024-13059, a critical vulnerability flat that affects AnythingLLM’s handling of ASCII filenames in the multer library. The post CVE-2024-13059: Exploiting Path Traversal in AnythingLLM for Remote Code Execution appeared first on OffSec. This article has been indexed from OffSec…
Krebs throws himself on the grenade, resigns from SentinelOne after Trump revokes security clearances
Illegitimi non carborundum? Nice password, Mr Ex-CISA Chris Krebs, the former head of the US Cybersecurity and Infrastructure Security Agency (CISA) and a longtime Trump target, has resigned from SentinelOne following a recent executive order that targeted him and revoked…
CSP FY: A Magecart Attack That Dodges Policy—and Makes a Joke While Doing It
by Source Defense When attackers are clever enough to name their cookie “csp_f_y,” you know they’re not just exfiltrating data—they’re mocking your defenses. In a recent attack spotted by the Source Defense Cyber Research team, a compromised first-party script on…
Researchers Find CVSS 10.0 Severity RCE Vulnerability in Erlang/OTP SSH
Security researchers report CVE-2025-32433, a CVSS 10.0 RCE vulnerability in Erlang/OTP SSH, allowing unauthenticated code execution on exposed… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Researchers Find…
How to help prevent hotlinking using referer checking, AWS WAF, and Amazon CloudFront
Note: This post was first published April 21, 2016. The updated version aligns with the latest version of AWS WAF (AWS WAF v2) and includes screenshots that reflect the changes in the AWS console experience. AWS WAF Classic has been…
Care what you share
In this week’s newsletter, Thorsten muses on how search engines and AI quietly gather your data while trying to influence your buying choices. Explore privacy-friendly alternatives and get the scoop on why it’s important to question the platforms you interact…
MITRE Impact Report 2024: Strengthening Threat-Informed Defenses
To mark the organization’s fifth anniversary, MITRE’s Center for Threat-Informed Defense published its 2024 Impact Report, which details the organization’s 40 open-source research projects and how they benefit the cybersecurity community. This is a closer look at three of those…
Serious Flaw Found in Popular File-Sharing Tool Used by IT Providers
A major security problem has been found in a widely used file-sharing platform, and hackers have already started taking advantage of it. This tool, called CentreStack, is often used by IT service providers to help businesses manage and share…
Qrator Labs Reports Mitigating Year’s Largest DDoS Attack to Date
Qrator Labs reports it mitigated a massive record 965 Gbps DDoS attack in April 2025, the largest incident… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Qrator Labs…
‘No AI Agents are Allowed.’ EU Bans Use of AI Assistants in Virtual Meetings
In a presentation delivered this month by the European Commission, a meeting etiquette slide stated “No AI Agents are allowed.” This article has been indexed from Security | TechRepublic Read the original article: ‘No AI Agents are Allowed.’ EU Bans…
Schneider Electric Sage Series
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Sage series Vulnerabilities: Out-of-bounds Write, Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’), Incorrect Default Permissions, Unchecked Return Value, Buffer…
Schneider Electric Trio Q Licensed Data Radio
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 5.4 ATTENTION: Low attack complexity Vendor: Schneider Electric Equipment: Trio Q Licensed Data Radio Vulnerabilities: Insecure Storage of Sensitive Information, Initialization of a Resource with an Insecure Default 2. RISK EVALUATION Successful exploitation…
CISA Releases Six Industrial Control Systems Advisories
CISA released six Industrial Control Systems (ICS) advisories on April 17, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-107-01 Schneider Electric Trio Q Licensed Data Radio ICSA-25-107-02 Schneider Electric Sage Series ICSA-25-107-03…
Yokogawa Recorder Products
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Yokogawa Equipment: GX10, GX20, GP10, GP20, GM Data Acquisition System, DX1000, DX2000, DX1000N, FX1000, μR10000, μR20000, MW100, DX1000T, DX2000T, CX1000, CX2000 Vulnerability: Missing Authentication for Critical…