Threat Actor: Unknown | unknown Victim: Microsoft Users | Microsoft Users
Key Point :
Microsoft addressed 161 vulnerabilities, including 11 rated Critical and 149 Important.…Threat Actor: Unknown | unknown Victim: Microsoft Users | Microsoft Users
Key Point :
Microsoft addressed 161 vulnerabilities, including 11 rated Critical and 149 Important.…Threat Actor: Unknown | unknown Victim: Millions of users | millions of users
Key Point :
The vulnerability allows attackers to access accounts of former employees by purchasing defunct domains.…Threat Actor: Unknown | unknown Victim: Apple | Apple
Key Point :
The vulnerability allows attackers running as “root” to bypass SIP protections.…Threat Actor: Cybercriminals | cybercriminals Victim: Organizations using SaaS | organizations using SaaS
Key Point :
Modern work heavily relies on SaaS, leading to rapid account creation and an expanded attack surface.…Threat Actor: Unknown | unknown Victim: Various organizations | various organizations
Key Point :
The campaign began in mid-November 2024, with attackers gaining unauthorized access to firewall management interfaces.…Threat Actor: HuiOne Guarantee | HuiOne Guarantee Victim: Global online users | online users
Key Point :
HuiOne Guarantee has received at least $24 billion in cryptocurrency, significantly more than the defunct Hydra marketplace.…Threat Actor: Unknown | unknown Victim: Cloud enterprises | cloud enterprises
Key Point :
The vulnerability has a CVSS score of 10.0, indicating maximum severity.…Threat Actor: Ransomware Groups | Babuk Victim: Organizations using VMware ESXi | VMware ESXi
Key Point :
Ransomware attacks on ESXi servers are increasingly targeting critical file types, including VMDK, VMEM, VSWP, and VMSN files.…Threat Actor: UNC5337 | UNC5337 Victim: Ivanti | Ivanti
Key Point :
A critical vulnerability in Ivanti Connect Secure appliances has been exploited as a zero-day, allowing for remote code execution.…Threat Actor: FunkSec | FunkSec Victim: Various organizations | various organizations
Key Point :
FunkSec uses double extortion tactics, combining data theft with encryption to pressure victims.…Threat Actor: Remote attackers | remote attackers Victim: Samsung smartphone users | Samsung smartphone users
Key Point :
The vulnerability allows for arbitrary code execution via specially crafted audio messages sent through Google Messages.…Threat Actor: Cybercriminals | cybercriminals Victim: Healthcare Organizations | healthcare organizations
Key Point :
Elisity’s Virtual Edge allows for microsegmentation without new hardware, using lightweight virtual connectors.…Threat Actor: (authenticated attacker, unauthenticated attacker) | threat actor Victim: (Palo Alto Networks, SonicWall, Aviatrix) | Palo Alto Networks, SonicWall, Aviatrix
Key Point :
Palo Alto Networks addressed multiple vulnerabilities in its Expedition tool, including SQL injection and XSS flaws.…