Threat Actor: Unknown | unknown Victim: GFI KerioControl | GFI KerioControl
Key Point :
The vulnerability allows attackers to inject malicious inputs into HTTP response headers, leading to RCE.…Threat Actor: Unknown | unknown Victim: GFI KerioControl | GFI KerioControl
Key Point :
The vulnerability allows attackers to inject malicious inputs into HTTP response headers, leading to RCE.…Threat Actor: UNC5337 | UNC5337 Victim: Ivanti Connect Secure Users | Ivanti Connect Secure Users
Key Point :
Exploitation of CVE-2025-0282 allows unauthenticated remote code execution, compromising entire networks.…Key Points :
Hackers claimed to have breached Gravy Analytics and its subsidiary Venntel. 17 terabytes of data allegedly stolen, including sensitive customer information and smartphone location data.…Keypoints :
CISA released advisories ICSA-25-007-01 and ICSA-25-007-02 to address vulnerabilities in ICS products.…WordPress has become a popular platform for building websites, including those of governmental entities. This article explores the existence of Indonesian government websites that are built using WordPress but are not properly maintained. We will delve into how Google dorks can be used to identify these sites, the idea for assessing the WordPress versions, and the implications for security vulnerabilities.…
Cross-Site Scripting Summary
Short SummaryThe video discusses cross-site scripting (XSS) attacks, where malicious users can inject code into websites to manipulate user sessions and steal sensitive information.
Key Points Introduction to cross-site scripting (XSS) and its implications. Demonstration of how attackers can inject malicious scripts into websites.…Summary: The Securonix Threat Research team has identified a sophisticated tax-themed phishing campaign that utilizes MSC files and advanced obfuscation techniques to deploy a stealthy backdoor payload. This advisory details the technical aspects and methodologies employed by the threat actors in this campaign.…
Summary :
The Securonix Threat Research team has identified a tax-themed phishing campaign utilizing MSC files and advanced obfuscation techniques to deliver a stealthy backdoor payload. This campaign marks a shift in tactics, moving away from traditional LNK files to exploit MSC files for malicious code execution.…
Summary :
HeartCrypt is a new packer-as-a-service (PaaS) that has been used to protect malware since its launch in February 2024. It allows malware operators to pack their malicious payloads into legitimate binaries, facilitating the spread of various malware families. #HeartCrypt #MalwarePacker #CyberThreats
Keypoints :
HeartCrypt has been in development since July 2023 and began sales in February 2024.…Summary: Hackers are leveraging a critical vulnerability in the Hunk Companion plugin to install outdated and exploitable plugins from the WordPress.org repository, leading to severe security risks. WPScan has identified the flaw, tracked as CVE-2024-11972, and a security update has been released to mitigate the issue.…
### #GitLabSecurity #VulnerabilityPatch #SessionDataExfiltration
Summary: GitLab has released a critical security update addressing multiple vulnerabilities across various versions of its platform, which could lead to severe consequences such as account takeovers and denial of service attacks. Users are strongly urged to update their installations to mitigate these risks.…
### #SAPSecurity #PatchManagement #VulnerabilityAlert
Summary: SAP’s latest Security Patch Day has revealed 10 new Security Notes, including critical vulnerabilities that require immediate action from organizations using SAP solutions. Notably, CVE-2024-47578 poses severe exploitation risks, highlighting the urgency for patch application.
Threat Actor: Unknown | unknown Victim: Organizations using SAP solutions | organizations using SAP solutions
Key Point :
10 new Security Notes released, with multiple critical vulnerabilities requiring immediate attention.…### #PromptInjection #AIExploitation #SessionHijacking
Summary: A recently patched vulnerability in the DeepSeek AI chatbot allowed for prompt injection attacks, enabling attackers to hijack user sessions and access sensitive data. This flaw highlights the risks associated with cross-site scripting (XSS) in AI applications and the potential for broader exploitation across various platforms.…
### #MachineLearningSecurity #ModelExploitation #SupplyChainRisks
Summary: Recent research has unveiled multiple security vulnerabilities in open-source machine learning tools that could enable code execution and compromise sensitive data. These flaws, affecting popular frameworks like MLflow, H2O, and PyTorch, highlight the risks associated with loading untrusted ML models.
Threat Actor: Unknown | unknown Victim: Organizations using ML tools | organizations using ML tools
Key Point :
Multiple vulnerabilities discovered in ML frameworks could lead to remote code execution (RCE).…### #RomanianElections #InfluenceCampaign #CyberEspionage
Summary: The Romanian constitutional court annulled the presidential elections due to a TikTok influence campaign linked to Russia, alongside over 85,000 cyberattacks targeting the country’s election infrastructure. Declassified intelligence reports reveal significant vulnerabilities exploited by threat actors, suggesting state-sponsored interference.
Threat Actor: Unknown State Actor | Russia Victim: Romanian Electoral Authority | Romanian Electoral Authority
Key Point :
Romania’s election infrastructure faced over 85,000 cyberattacks, with compromised credentials leaked on Russian forums.…### #MobSFExploits #XSSFlaw #ScriptInjection
Summary: A critical Stored Cross-Site Scripting (XSS) vulnerability, CVE-2024-53999, has been discovered in the Mobile Security Framework (MobSF), allowing attackers to inject malicious scripts through improperly handled file uploads. This flaw poses significant risks to user data confidentiality and system integrity.
Threat Actor: Unknown | unknown Victim: Mobile Security Framework (MobSF) | Mobile Security Framework
Key Point :
A vulnerability in MobSF version 4.2.8 allows file uploads with script-laden filenames, leading to potential XSS attacks.…