View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Johnson Controls Inc. Equipment: ICU Vulnerability: Stack-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code. 3.…
Category: EN
RSA Conference 2025 – Pre-Event Announcements Summary (Part 1)
Hundreds of companies are showcasing their products and services at the 2025 edition of the RSA Conference in San Francisco. The post RSA Conference 2025 – Pre-Event Announcements Summary (Part 1) appeared first on SecurityWeek. This article has been indexed…
ARMO: io_uring Interface Creates Security ‘Blind Spot’ in Linux
Researchers from security firm ARMO developed a POC rootkit called Curing that showed how the io_uring interface in Linux could be exploited by bad actors to bypass system calls, creating what they calle a “massive security loophole” in the operating…
Symantec Links Betruger Backdoor Malware to RansomHub Ransomware Attacks
A sophisticated custom backdoor malware called Betruger has been discovered in recent ransomware campaigns, with Symantec researchers linking its use to affiliates of the RansomHub ransomware-as-a-service (RaaS) group. The new malware is considered a rare and powerful tool designed…
Over 16,000 Fortinet Devices Infected With the Symlink Backdoor
Over 16,000 internet-connected Fortinet devices have been identified as having a new symlink backdoor that permits read-only access to sensitive data on previously compromised systems. The Shadowserver Foundation, a threat monitoring platform, has stated that 14,000 machines were exposed.…
ELENOR-corp Ransomware Targets Healthcare Sector
ELENOR-corp ransomware, a new version of Mimic, is targeting healthcare organizations using advanced capabilities This article has been indexed from www.infosecurity-magazine.com Read the original article: ELENOR-corp Ransomware Targets Healthcare Sector
Gmail’s New Encrypted Messages Feature Opens a Door for Scams
Google is rolling out an end-to-end encrypted email feature for business customers, but it could spawn phishing attacks, particularly in non-Gmail inboxes. This article has been indexed from Security Latest Read the original article: Gmail’s New Encrypted Messages Feature Opens…
Jericho Security Gets $15 Million for AI-Powered Awareness Training
Jericho Security has raised $15 million in Series A funding for its AI-powered employee cybersecurity training platform. The post Jericho Security Gets $15 Million for AI-Powered Awareness Training appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Data in Danger: Detecting Cross-Site Scripting in Grafana
Learn how SonarQube detected a Cross-Site Scripting (XSS) vulnerability in Grafana, a popular open-source data observability platform. The post Data in Danger: Detecting Cross-Site Scripting in Grafana appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Harness Adds Traceable WAAP to Secure Web Apps and APIs
Harness today unfurled a cloud web application and application programming interface (API) protection (WAAP) platform that makes it simpler for security operation (SecOps) teams to defend application environments. The post Harness Adds Traceable WAAP to Secure Web Apps and APIs…
Alphabet’s Google Notifies Staff Of Job Threat Over Remote Working
Several units within Google notified remote workers jobs will be in jeopardy if they don’t return to office for set number of days This article has been indexed from Silicon UK Read the original article: Alphabet’s Google Notifies Staff Of…
Assassin’s Creed maker faces GDPR complaint for forcing single-player gamers online
Collecting data from solo players is a Far Cry from being necessary, says noyb For anyone who’s ever been frustrated by the need to go online to play a single-player video game, the European privacy specialists at noyb have heard…
ALBEDO Telecom Net.Time – PTP/NTP Clock
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: ALBEDO Telecom Equipment: Net.Time – PTP/NTP clock Vulnerability: Insufficient Session Expiration 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to transmit passwords…
Schneider Electric Modicon Controllers
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M580, Modicon M340, Modicon Premium, and Modicon Quantum Vulnerabilities: Trust Boundary Violation, Uncaught Exception, Exposure of Sensitive Information to an Unauthorized Actor,…
Linux io_uring Security Blind Spot Let Attackers Stealthily Deploy Rootkits
A critical vulnerability exists in Linux’s security framework, revealing that many runtime security tools struggle to detect threats operating via the io_uring interface. This discovery exposes a critical gap in protection for Linux-based systems across cloud environments and data centers…
CISA Confirms Continued Support for CVE Program, No Funding Issues
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has reaffirmed its strong commitment to the Common Vulnerabilities and Exposures (CVE) Program, following recent public reports that inaccurately suggested the program was in jeopardy due to funding shortages. CISA clarified that…
New Stego Campaign Leverages MS Office Vulnerability to Deliver AsyncRAT
Cybersecurity researchers have discovered a sophisticated malware campaign that employs steganography techniques to hide malicious code within seemingly innocent image files. This attack chain leverages an older Microsoft Office vulnerability (CVE-2017-0199) to ultimately deliver AsyncRAT, a remote access trojan capable…
ToyMaker Hackers Compromised Multitude Hosts Using SSH & File Transfer Tools
In 2023, cybersecurity experts uncovered an extensive compromise in critical infrastructure enterprises by a sophisticated threat actor group. This initial access broker, dubbed “ToyMaker,” systematically exploited vulnerable internet-facing systems before deploying custom backdoors to extract credentials from victim organizations. Their…
Zoom attack tricks victims into allowing remote access to install malware and steal money
Attachers are luring victims into a Zoom call and then taking over their PC to install malware, infiltrate their accounts, and steal their assets. This article has been indexed from Malwarebytes Read the original article: Zoom attack tricks victims into…
Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Flaws and ThreatNeedle Malware
At least six organizations in South Korea have been targeted by the prolific North Korea-linked Lazarus Group as part of a campaign dubbed Operation SyncHole. The activity targeted South Korea’s software, IT, financial, semiconductor manufacturing, and telecommunications industries, according to…