A critical vulnerability in Git’s command-line interface has been disclosed with public proof-of-concept exploits available, allowing arbitrary file writes and remote code execution on Linux and macOS systems. CVE-2025-48384 affects Git installations using git clone –recursive on weaponized repositories, exploiting improper handling…
Government Organizations Targeted via AWS Lambda URL Endpoint Exploits
Unit 42 researchers from Palo Alto Networks have been monitoring a sophisticated threat cluster designated CL-STA-1020, which has been systematically targeting governmental entities across Southeast Asia. This operation focuses on extracting sensitive data from government agencies, particularly details surrounding recent…
Cybercriminals Clone CNN, BBC, and CNBC Sites to Lure Victims into Investment Fraud
Researchers have unveiled a sprawling cybercrime syndicate orchestrating an elaborate phishing and investment fraud campaign by cloning legitimate news outlets such as CNN, BBC, CNBC, News24, and ABC News. This operation leverages domain spoofing and typosquatting techniques to fabricate over…
Britain’s billion-pound F-35s not quite ready for, well, anything
Stealth jets can’t fight, can’t fly much, and can’t shoot UK missiles, says NAO The F-35 stealth fighter is not meeting its potential in British service because of availability issues, a shortage of support personnel, and delays in integrating key…
FBI seized multiple piracy sites distributing pirated video games
FBI seizes multiple piracy sites for Nintendo Switch and PlayStation 4 games, dismantling their infrastructure. The FBI, with the help of the Dutch FIOD, seized multiple piracy sites distributing pirated video games, including nsw2u.com, ps4pkg.com, and mgnetu.com, dismantling their infrastructure.…
MaReads – 74,453 breached accounts
In June 2025, MaReads, the website for readers and writers of Thai-language fiction and comics suffered a data breach that exposed 74k records. The breach included usernames, email addresses, phone numbers and dates of birth. MaReads is aware of the…
CBI Busts Noida Based Tech Support Scam Targeting UK & Australian Citizens
The Central Bureau of Investigation (CBI) has successfully dismantled a sophisticated transnational cybercrime syndicate operating from Noida’s Special Economic Zone, targeting citizens across the United Kingdom and Australia through elaborate tech support scams. The operation, conducted on July 7, 2025,…
Symantec Endpoint Management Suite Vulnerability Allows Malicious Code Execution Remotely
A critical security vulnerability has been discovered in Broadcom’s Symantec Endpoint Management Suite that enables unauthenticated remote code execution, posing significant risks to enterprise IT infrastructure. The flaw, designated CVE-2025-5333 with a severe CVSS v4.0 score of 9.5, affects multiple…
Ransomware Group Claims Attack on Belk
DragonForce says it stole more than 150 gigabytes of data from US department store chain Belk in a May cyberattack. The post Ransomware Group Claims Attack on Belk appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Zip Security Raises $13.5 Million in Series A Funding
Zip Security’s Series A funding round led by Ballistic Ventures will help the company grow its engineering and go-to-market teams. The post Zip Security Raises $13.5 Million in Series A Funding appeared first on SecurityWeek. This article has been indexed…
North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign
The North Korean threat actors linked to the Contagious Interview campaign have been observed publishing another set of 67 malicious packages to the npm registry, underscoring ongoing attempts to poison the open-source ecosystem via software supply chain attacks. The packages,…
EU-App zur Alterskontrolle: Fünf Staaten beginnen mit den Tests
Bevor man auf nicht jugendfreie Inhalte zugreifen kann, soll man in der EU bald sein Alter nachweisen können. Fünf Staaten beginnen nun mit Probeläufen. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: EU-App zur Alterskontrolle:…
Schutz in Städten: Sicher wohlfühlen
Damit Städte lebenswert sind, muss sich die Bevölkerung sicher fühlen. Wie gelingt der Balanceakt zwischen Schutz und Lebensqualität? Dieser Artikel wurde indexiert von Newsfeed Lesen Sie den originalen Artikel: Schutz in Städten: Sicher wohlfühlen
Potenzielles Sicherheitsleck bei GommeHD: Möglicherweise Datenleck
Der deutsche Minecraft-Server GommeHD hat wohl eine Schwachstelle und ein Datenleck. User sollten ihre Passwörter ändern. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: Potenzielles Sicherheitsleck bei GommeHD: Möglicherweise Datenleck
[UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um beliebigen Programmcode auszuführen, einen ‘Denial of Service’-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie…
[UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen…
[UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service
Ein lokaler Angreifer kann eine Schwachstelle in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] Linux Kernel: Schwachstelle…
[UPDATE] [mittel] Red Hat Enterprise Linux (python-setuptools): Schwachstelle ermöglicht Codeausführung
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux ausnutzen, um beliebigen Programmcode auszuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] Red Hat Enterprise…
[UPDATE] [mittel] GNU libc: Mehrere Schwachstellen ermöglichen Manipulation von Daten
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in GNU libc ausnutzen, um Daten zu manipulieren. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] GNU libc: Mehrere Schwachstellen ermöglichen…
Keylogger Data Stored in an ADS, (Tue, Jul 15th)
If many malware samples try to be “filess” (read: they try to reduce their filesystem footprint to the bare minimum), another technique remains interesting: Alternate Data Streams or “ADS”[1]. This NTFS feature allows files to contain multiple data streams, enabling…
Paddy Power, Betfair Customers Warned Of Fraud Risk
Betting sites Paddy Power, Betfair warn customers to beware of highly targeted fraudulent emails after data breach This article has been indexed from Silicon UK Read the original article: Paddy Power, Betfair Customers Warned Of Fraud Risk
ImageMagick Vulnerability Enables RCE via Malicious File Name Patterns
A critical vulnerability in ImageMagick’s image processing library has been disclosed, enabling remote code execution through carefully crafted filename templates. Tracked as CVE-2025-53101, the flaw stems from a stack buffer underwrite in the MagickCore/image.c module. By specifying multiple consecutive format…
CBI Uncovers Noida Tech Support Scam Targeting Victims in UK and Australia
The Central Bureau of Investigation (CBI) has made a major breakthrough in Operation Chakra-V by taking down a sophisticated global cybercrime network that was primarily targeting people in Australia and the United Kingdom with tech support frauds. This operation highlights…
20-Year-Old Vulnerability Allows Hackers to Control Train Brakes
CISA has issued a critical advisory warning about a severe vulnerability in railway communication systems that could allow attackers to control train brakes remotely. The vulnerability, assigned CVE-2025-1727, affects End-of-Train and Head-of-Train remote linking protocols used across the United States…