A recent surge in exploitation activity has been observed targeting two critical vulnerabilities, CVE-2022-47945 in ThinkPHP and CVE-2023-49103 in ownCloud. These attacks highlight the persistent threat posed by unpatched systems and the challenges organizations face in prioritizing vulnerability management. CVE-2022-47945…
Winnti Hackers Attacking Japanese Organizations With New Malware
The China-based Winnti Group has targeted Japanese organizations in a recent cyberattack campaign known as “RevivalStone,” in the manufacturing, materials, and energy sectors. This campaign, confirmed in March 2024, utilizes a new version of the Winnti malware with enhanced capabilities.…
Apple To Integrate Alibaba’s AI Into iPhones In China
Apple Intelligence in China is reportedly not going to utilise OpenAI’s ChatGPT, after Alibaba confirmed AI partnership with Apple This article has been indexed from Silicon UK Read the original article: Apple To Integrate Alibaba’s AI Into iPhones In China
BadPilot Attacking Network Devices to Expand Russian Seashell Blizzard’s Attacks
A newly uncovered cyber campaign, dubbed “BadPilot,” has been linked to a subgroup of the Russian state-sponsored hacking collective Seashell Blizzard, also known as Sandworm. This operation, active since at least 2021, represents a significant expansion in Russia’s cyber activities,…
Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website
A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm, has intensified its cyber operations through a campaign dubbed BadPilot. This multi-year initiative has targeted critical infrastructure worldwide, expanding the group’s reach beyond its traditional focus…
Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques
Astaroth is an advanced phishing kit using real-time credential and session cookie capture to compromise Gmail, Yahoo and Office 365 accounts This article has been indexed from www.infosecurity-magazine.com Read the original article: Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy…
IT Security News Hourly Summary 2025-02-13 15h : 29 posts
29 posts were published in the last hour 13:34 : [UPDATE] [mittel] gcc: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen 13:33 : [UPDATE] [mittel] Intel Prozessoren: Schwachstelle ermöglicht Offenlegung von Informationen 13:33 : [UPDATE] [mittel] Ansible: Schwachstelle ermöglicht Offenlegung von Informationen 13:33…
[UPDATE] [mittel] gcc: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in gcc ausnutzen, um Sicherheitsvorkehrungen zu umgehen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] gcc: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
[UPDATE] [mittel] Intel Prozessoren: Schwachstelle ermöglicht Offenlegung von Informationen
Ein lokaler Angreifer kann eine Schwachstelle in Intel Prozessoren ausnutzen, um Informationen offenzulegen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] Intel Prozessoren: Schwachstelle ermöglicht Offenlegung von Informationen
[UPDATE] [mittel] Ansible: Schwachstelle ermöglicht Offenlegung von Informationen
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Ansible ausnutzen, um Informationen offenzulegen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] Ansible: Schwachstelle ermöglicht Offenlegung von Informationen
[UPDATE] [mittel] jQuery: Mehrere Schwachstellen ermöglichen Cross-Site Scripting
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in jQuery ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [UPDATE] [mittel] jQuery: Mehrere Schwachstellen ermöglichen…
[UPDATE] [hoch] Intel Prozessoren: Mehrere Schwachstellen
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um seine Privilegien zu erhöhen, einen Denial of Service Angriff durchzuführen oder vertrauliche Daten einzusehen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security…
Cybercriminals Exploit Pyramid Pentesting Tool for Covert C2 Communications
Cybersecurity analysts have identified that hackers are leveraging the open-source Pyramid pentesting tool to establish stealthy command-and-control (C2) communications. Originally designed as a post-exploitation framework for penetration testers, Pyramid has become an attractive option for malicious actors due to its…
Urgent Apple released iOS 18.3.1 and iPadOS 18.3.1 Security Updates
Apple has urgently released iOS 18.3.1 and iPadOS 18.3.1 to address a critical zero-day vulnerability, identified as CVE-2025-24200,… The post Urgent Apple released iOS 18.3.1 and iPadOS 18.3.1 Security Updates appeared first on Hackers Online Club. This article has been…
January 2025’s Most Wanted Malware: FakeUpdates Continues to Dominate
Check Point Software’s latest threat index highlights that FakeUpdates continues to pose a significant threat in the cyber landscape, playing a crucial role in facilitating ransomware attacks. A recent investigation by security researchers revealed that an affiliate of RansomHub utilized…
CyberArk snaps up Zilla Security for up to $175M
Information security company CyberArk has acquired identity access and governance platform Zilla Security in a deal worth up to $175 million. Founded in 1999, Boston-based CyberArk specializes in access management, including privileged access security which helps organizations protect sensitive data…
Introducing Cortex Cloud — The Future of Real-Time Cloud Security
Cortex Cloud brings the world’s leading CNAPP onto the #1 SecOps platform, delivering real-time protection — for the first time — from code to cloud to SOC. The post Introducing Cortex Cloud — The Future of Real-Time Cloud Security appeared…
Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job
A toolset associated with China-linked espionage intrusions was employed in a ransomware attack, likely by a single individual. The post Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Sandworm APT’s initial access subgroup hits organizations accross the globe
A subgroup of Russia’s Sandworm APT has been working to achieve initial and persistent access to the IT networks of organizations working in economic sectors Russia is interested in. “In 2022, its primary focus was Ukraine, specifically targeting the energy,…
CYBERSNACS #Folge 30: Cyber Resilience What ?
Der Cyber Resilience Act (CRA) ist im Dezember 2024 in Kraft getreten und zielt darauf ab, die Cybersicherheit von Produkten mit digitalen Elementen zu stärken. Nun ist der CRA, in vielerlei Hinsicht ein besonderes Gesetz, in Kraft getreten. In der…
Sicherheitslücken: Gitlab-Entwickler raten zu zügigem Update
Gitlab ist unter anderem für DoS-Attacken anfällig. Außerdem können vertrauliche Informationen leaken. Dieser Artikel wurde indexiert von heise Security Lesen Sie den originalen Artikel: Sicherheitslücken: Gitlab-Entwickler raten zu zügigem Update
Eckert & Ziegler: Cyberangriff trifft Berliner Medizintechnik-Konzern
Einer der größten Hersteller radioaktiver Komponenten für medizinische, wissenschaftliche und messtechnische Zwecke ist von Hackern attackiert worden. (Cybercrime, Cyberwar) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Eckert & Ziegler: Cyberangriff trifft Berliner Medizintechnik-Konzern
FortiOS Vulnerability Allows Super-Admin Privilege Escalation – Patch Now!
Super-admin access vulnerability discovered in FortiOS Security Fabric. Exploitation could lead to widespread network breaches. Update now. Fortinet has… This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: FortiOS Vulnerability Allows…
Palo Alto Firewall Flaw Exploited in RA World Ransomware Attacks
A recent ransomware attack leveraging a vulnerability in Palo Alto Networks’ PAN-OS firewall software (CVE-2024-0012) has raised significant concerns within the cybersecurity community. The attack, which targeted a medium-sized software and services company in South Asia in late 2024, is…