A significant security flaw (CVE-2025-46176) has exposed thousands of D-Link routers to remote code execution attacks through hardcoded Telnet credentials embedded in firmware. The vulnerability affects DIR-605L v2.13B01 and DIR-816L v2.06B01 models, scoring 6.5 on the CVSS v3.1 scale with…
Vulnerability in Popular macOS App Cursor Allows Malware to Bypass Privacy Protections, Exposing User Data
A critical security vulnerability has been discovered in Cursor, a popular AI-powered code editor for macOS, that enables malicious software to circumvent Apple’s built-in privacy protections and access sensitive user data without proper authorization. The vulnerability exploits a misconfiguration in…
ChatGPT o3 Model Bypassed to Sabotage the Shutdown Mechanism
OpenAI’s latest large language model, ChatGPT o3, actively bypassed and sabotaged its own shutdown mechanism even when explicitly instructed to allow itself to be turned off. Palisade Research, an AI safety firm, reported on May 24, 2025, that the advanced…
ICYMI: A Look Back at Exposure Management Academy Highlights
Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. This week, we look back on some highlights from the first couple of months of posts, including the…
Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto
As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames, IP addresses, DNS servers, and user directories to a Discord-controlled endpoint. The packages, published under three different accounts, come with…
IT Security News Hourly Summary 2025-05-26 15h : 9 posts
9 posts were published in the last hour 13:3 : AirBorne: Angriffe auf Geräte über Apple AirPlay | Offizieller Blog von Kaspersky 13:2 : Researchers Drop PoC for Fortinet CVE-2025-32756, Urging Quick Patching 13:2 : Oracle TNS Flaw Exposes System…
Werner Landstorfer ist neuer BDSW-Präsident
Der Geschäftsführer von Securitas Deutschland wurde zum Präsidenten des Bundesverbandes der Sicherheitswirtschaft gewählt. Dieser Artikel wurde indexiert von Newsfeed Lesen Sie den originalen Artikel: Werner Landstorfer ist neuer BDSW-Präsident
Windows Server 2025: Rechteausweitungslücke im AD
Akamai warnt vor einer ungepatchten Rechteausweitungslücke in Windows Server 2025. Admins müssen aktiv werden. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: Windows Server 2025: Rechteausweitungslücke im AD
SharpSuccessor PoC Released to Weaponize Windows Server 2025 BadSuccessor Flaw
A critical privilege escalation vulnerability in Windows Server 2025’s delegated Managed Service Account (dMSA) feature enables attackers to compromise Active Directory domains using tools like SharpSuccessor. This attack chain exploits default configurations to transform low-privileged users into Domain Admins through…
Katz Stealer Attacking Chrome, Edge, Brave & Firefox to Steal Login Details
A sophisticated new credential-stealing malware known as Katz Stealer has emerged as a significant threat to users of popular web browsers, demonstrating advanced capabilities that allow it to bypass modern security protections and exfiltrate sensitive authentication data. This malware-as-a-service operation…
Tenable Network Monitor Vulnerabilities Let Attackers Escalate Privileges
Two high-severity vulnerabilities (CVE-2025-24916, CVE-2025-24917) in Tenable Network Monitor solution, enabling local privilege escalation on Windows systems through insecure directory permissions and arbitrary code execution. The security flaws affect all versions prior to 6.5.1 and have been assigned high severity…
Fake DigiYatra Apps Attacking Indian Users to Steal Financial Data
A sophisticated phishing campaign targeting Indian air travelers has emerged, exploiting the trusted DigiYatra brand to harvest sensitive personal and financial information from unsuspecting users. The malicious operation centers around a deceptive website at digiyatra[.]in that masquerades as the official…
184 million records data leak: Google, PayPal and Netflix passwords leaked online
Security researcher Jeremiah Fowler stumbled upon a large database of login information and passwords containing over 184 million records recently. He mentioned the discovery in an article on Website Planet. The data […] Thank you for being a Ghacks reader.…
AirBorne: Angriffe auf Geräte über Apple AirPlay | Offizieller Blog von Kaspersky
Die Schwachstellen der AirBorne-Kategorie ermöglichen Angriffe auf AirPlay-fähige Geräte. Auch wurmbare Zero-Click-Exploits sind möglich. Dieser Artikel wurde indexiert von Offizieller Blog von Kaspersky Lesen Sie den originalen Artikel: AirBorne: Angriffe auf Geräte über Apple AirPlay | Offizieller Blog von Kaspersky
Researchers Drop PoC for Fortinet CVE-2025-32756, Urging Quick Patching
Researchers have released PoC for CVE-2025-32756, a severe security flaw, that is actively being exploited in Fortinet products… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Researchers Drop…
Oracle TNS Flaw Exposes System Memory to Unauthorized Access
Oracle has addressed a significant security flaw in its Transparent Network Substrate (TNS) protocol, used for database communications, with the release of a patch on April 15, 2025. The vulnerability, tracked as CVE-2025-30733, could allow unauthenticated remote attackers to access…
Bundeswehr setzt auf Google-Cloud
Für die “private Cloud der Bundeswehr” steht nun ein Vertragspartner fest – sie kommt von Google. Zwei Cloud-Instanzen sollen entstehen. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: Bundeswehr setzt auf Google-Cloud
⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs
Cyber threats don’t show up one at a time anymore. They’re layered, planned, and often stay hidden until it’s too late. For cybersecurity teams, the key isn’t just reacting to alerts—it’s spotting early signs of trouble before they become real…
CISO’s Guide To Web Privacy Validation And Why It’s Important
Are your web privacy controls protecting your users, or just a box-ticking exercise? This CISO’s guide provides a practical roadmap for continuous web privacy validation that’s aligned with real-world practices. – Download the full guide here. Web Privacy: From Legal…
GIMP: Mehrere Schwachstellen ermöglichen Codeausführung
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in GIMP ausnutzen, um beliebigen Programmcode auszuführen. Zur erfolgreichen Ausnutzung reicht es, wenn das Opfer eine entsprechend manipulierte Bilddatei öffnet. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Bürger Cert)…
[NEU] [mittel] Red Hat Enterprise Linux (libsoup): Mehrere Schwachstellen
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Denial of Service Angriff oder weitere nicht spezifizierte Angriffe durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie…
[NEU] [hoch] GIMP: Mehrere Schwachstellen ermöglichen Codeausführung
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in GIMP ausnutzen, um beliebigen Programmcode auszuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [NEU] [hoch] GIMP: Mehrere Schwachstellen ermöglichen Codeausführung
Severe vBulletin Flaw Allows Remote Code Execution by Attackers
A newly discovered vulnerability in vBulletin, one of the world’s most popular commercial forum platforms, has highlighted the dangers of relying on method visibility for security. The flaw, affecting vBulletin versions 5.x and 6.x running on PHP 8.1 or later,…
China-linked APT UNC5221 started exploiting Ivanti EPMM flaws shortly after their disclosure
China-linked APT exploit Ivanti EPMM flaws to target critical sectors across Europe, North America, and Asia-Pacific, according to EclecticIQ. Researchers from EclecticIQ observed a China-linked APT group that chained two Ivanti EPMM flaws, tracked as CVE-2025-4427 and CVE-2025-4428, in attacks…