Threat actors actively exploit a critical vulnerability in Apache Tomcat, tracked as CVE-2025-24813, which could enable unauthorized remote code execution (RCE) on vulnerable servers. The vulnerability, first disclosed on March 10, 2025, has already seen exploitation attempts beginning just 30…
NAKIVO Backup & Replication vulnerability exploited by attackers (CVE-2024-48248)
A vulnerability (CVE-2024-48248) in NAKIVO Backup and Replication, a backup, ransomware protection and disaster recovery solution designed for organizations of all sizes and managed service providers (MSPs), is being actively exploited. The US Cybersecurity and Infrastructure Security Agency (CISA) has…
Attackers Use Fake CAPTCHAs to Deploy Lumma Stealer RAT
Attackers are exploiting user familiarity with CAPTCHAs to distribute the Lumma Stealer RAT via malicious PowerShell commands, according to HP This article has been indexed from www.infosecurity-magazine.com Read the original article: Attackers Use Fake CAPTCHAs to Deploy Lumma Stealer RAT
Fake-Firmen auf Google-Maps: Google verklagt Scammer wegen 10.000 Falscheinträgen
Neben den gefälschten Unternehmensprofilen aus der eingereichten Klage hat Google im Jahr 2023 weitere 12 Millionen Einträge entfernt. (Google, Security) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Fake-Firmen auf Google-Maps: Google verklagt Scammer wegen…
[UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Zustand herbeizuführen oderum einen nicht näher spezifizierten Angriff durchzuführen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen…
UAT-5918 Hackers Exploit N-Day Vulnerabilities in Exposed Web and Application Servers
A recent cybersecurity threat, identified as UAT-5918, has been actively targeting entities in Taiwan, particularly those in critical infrastructure sectors such as telecommunications, healthcare, and information technology. This advanced persistent threat (APT) group is believed to be motivated by establishing…
Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 – Patch Now
A concerning development has emerged with the active exploitation of Apache Tomcat servers through the recently disclosed vulnerability, CVE-2025-24813. This vulnerability allows attackers to potentially execute remote code (RCE) if successfully exploited. The cybersecurity firm GreyNoise has identified multiple IPs…
Schneider Electric EcoStruxure™
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Low attack complexity Vendor: Schneider Electric Equipment: EcoStruxure™ Vulnerability: Improper Privilege Management 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to cause a local privilege escalation, which…
Imperva Named a Leader in Forrester Wave™: Web Application Firewall (WAF) Solutions: A Continued Legacy of Excellence
In today’s digital-first environment, protecting web applications and APIs is a critical priority for businesses. Organisations seek trusted solutions that balance robust protection, scalability, and ease of use. It’s no surprise that Imperva has been named a Leader in the…
Industry Reactions to Google Buying Wiz: Feedback Friday
Industry professionals comment on Google acquiring cloud security giant Wiz for $32 billion in cash. The post Industry Reactions to Google Buying Wiz: Feedback Friday appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers
Two known threat activity clusters codenamed Head Mare and Twelve have likely joined forces to target Russian entities, new findings from Kaspersky reveal. “Head Mare relied heavily on tools previously associated with Twelve. Additionally, Head Mare attacks utilized command-and-control (C2)…
China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware Families
The China-linked advanced persistent threat (APT) group. known as Aquatic Panda has been linked to a “global espionage campaign” that took place in 2022 targeting seven organizations. These entities include governments, catholic charities, non-governmental organizations (NGOs), and think tanks across…
10 Critical Network Pentest Findings IT Teams Overlook
After conducting over 10,000 automated internal network penetration tests last year, vPenTest has uncovered a troubling reality that many businesses still have critical security gaps that attackers can easily exploit. Organizations often assume that firewalls, endpoint protection, and SIEMs are…
Jetzt patchen! Angreifer attackieren Nakivo Backup & Replication Director
Angreifer nutzen eine Sicherheitslücke in der Backuplösung Nakivo Backup & Replication Director aus. Es gibt einen Sicherheitspatch. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: Jetzt patchen! Angreifer attackieren Nakivo Backup & Replication Director
Veeam RCE Vulnerability Allows Domain Users to Hack Backup Servers
Researchers uncovered critical Remote Code Execution (RCE) vulnerabilities in the Veeam Backup & Replication solution. These vulnerabilities, which include CVE-2025-23120, exploit weaknesses in deserialization mechanisms, potentially allowing any domain user to gain SYSTEM access to Veeam backup servers. This is…
MEDUSA Ransomware Deploys Malicious ABYSSWORKER Driver to Disable EDR
In a recent analysis by Elastic Security Labs, a malicious driver known as ABYSSWORKER has been identified as a key component in the MEDUSA ransomware attack chain. This driver is specifically designed to disable endpoint detection and response (EDR) systems,…
How to Avoid US-Based Digital Services—and Why You Might Want To
Amid growing concerns over Big Tech firms aligning with Trump administration policies, people are starting to move their digital lives to services based overseas. Here’s what you need to know. This article has been indexed from Security Latest Read the…
Schneider Electric EcoStruxure™
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Low attack complexity Vendor: Schneider Electric Equipment: EcoStruxure™ Vulnerability: Improper Privilege Management 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to cause a local privilege escalation, which…
Imperva Named a Leader in Forrester Wave™: Web Application Firewall (WAF) Solutions: A Continued Legacy of Excellence
In today’s digital-first environment, protecting web applications and APIs is a critical priority for businesses. Organisations seek trusted solutions that balance robust protection, scalability, and ease of use. It’s no surprise that Imperva has been named a Leader in the…
Ransomware Group Claims Attacks on Ascom, Jaguar Land Rover
The Hellcat ransomware group claims to have stolen tens of gigabytes of data from Ascom and Jaguar Land Rover. The post Ransomware Group Claims Attacks on Ascom, Jaguar Land Rover appeared first on SecurityWeek. This article has been indexed from…
Fifth Circuit Strikes Down “Geofence” Warrants – Conflict With Fourth Circuit
Geofence warrants are a relatively new tool that allows law enforcement to obtain location data from devices within a specified geographic area during a specific time frame. The post Fifth Circuit Strikes Down “Geofence” Warrants – Conflict With Fourth Circuit…
IT Security News Hourly Summary 2025-03-21 12h : 26 posts
26 posts were published in the last hour 10:39 : [NEU] [niedrig] Kubernetes: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen 10:38 : [NEU] [mittel] Tenable Security Nessus Agent: Schwachstelle ermöglicht Privilegieneskalation 10:38 : [NEU] [mittel] Liferay Portal und Liferay DXP: Schwachstelle ermöglicht…
[NEU] [niedrig] Kubernetes: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Ein Angreifer aus einem angrenzenden Netzwerk kann eine Schwachstelle in Kubernetes ausnutzen, um Sicherheitsvorkehrungen zu umgehen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [NEU] [niedrig] Kubernetes: Schwachstelle ermöglicht Umgehen…
[NEU] [mittel] Tenable Security Nessus Agent: Schwachstelle ermöglicht Privilegieneskalation
Ein lokaler Angreifer kann eine Schwachstelle in Tenable Security Nessus ausnutzen, um seine Privilegien zu erhöhen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen (Security Advisories) Lesen Sie den originalen Artikel: [NEU] [mittel] Tenable Security Nessus Agent:…