Thu.Jul 10, 2025

article thumbnail

Juniper Security Director Alert: Critical Flaw Allows Unauthenticated Access to Sensitive Resources

Penetration Testing

Juniper warns of a critical flaw (CVE-2025-52950, CVSS 9.6) in Security Director 24.4.1, allowing unauthenticated attackers to read or tamper with sensitive resources. Update immediately.

article thumbnail

Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads

The Hacker News

Cybersecurity researchers have discovered a critical vulnerability in the open-source mcp-remote project that could result in the execution of arbitrary operating system (OS) commands. The vulnerability, tracked as CVE-2025-6514, carries a CVSS score of 9.6 out of 10.0.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Helm Flaw (CVE-2025-53547): Local Code Execution via Malicious Chart.yaml & Symlinks

Penetration Testing

A flaw in Helm (CVE-2025-53547, CVSS 8.5) allows local code execution when updating dependencies via a malicious Chart.yaml and symlinked Chart.

article thumbnail

CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting Citrix NetScaler ADC and Gateway to its Known Exploited Vulnerabilities (KEV) catalog, officially confirming the vulnerability has been weaponized in the wild. The shortcoming in question is CVE-2025-5777 (CVSS score: 9.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How passkeys work: Let's start the passkey registration process

Zero Day

X Trending Amazon Prime Day is July 8 - 11: Here's what you need to know Best Prime Day deals overall 2025 Best Sam's Club tech deals 2025 Best Buy Black Friday in July deals 2025 Best Walmart tech deals 2025 Best Costco deals 2025 Best Prime Day tablet deals 2025 Best Prime Day laptop deals 2025 Best Prime Day TV deals 2025 Best Prime Day gaming deals 2025 Best Prime Day deals under $25 2025 Best Prime Day Kindle deals 2025 Best Prime Day Apple deals 2025 Best Prime Day EcoFlow deals

article thumbnail

SureForms WordPress Plugin Flaw (CVE-2025-6691): Unauthenticated Arbitrary File Deletion Leads to Site Takeover, 200K Sites at Risks

Penetration Testing

The post SureForms WordPress Plugin Flaw (CVE-2025-6691): Unauthenticated Arbitrary File Deletion Leads to Site Takeover, 200K Sites at Risks appeared first on Daily CyberSecurity.

Risk 83

LifeWorks

More Trending

article thumbnail

Critical Wing FTP Server RCE (CVE-2025-47812) Actively Exploited In The Wild

Penetration Testing

Huntress witnessed active exploitation of a critical RCE flaw (CVE-2025-47812) in Wing FTP Server, allowing root/SYSTEM access via null byte injection and Lua code execution.

article thumbnail

Rethinking API Security: Confronting the Rise of Business Logic Attacks (BLAs)

Security Boulevard

BLAs exploit the intended behavior of an API, abusing workflows, bypassing controls and manipulating transactions in ways that traditional security tools often miss entirely. The post Rethinking API Security: Confronting the Rise of Business Logic Attacks (BLAs) appeared first on Security Boulevard.

article thumbnail

CitrixBleed 2: CVE-2025-5777 Joins CISA’s KEV Catalog Amid Active Exploitation Storm, PoC Available

Penetration Testing

CISA adds critical CitrixBleed 2 (CVE-2025-5777, CVSS 9.2) to KEV, confirming active exploitation.

article thumbnail

2025 Supply Chain Threat Landscape: AI, APIs, and the Weakest Link

SecureWorld News

In 2025, global supply chains are expected to face an unprecedented wave of cyberattacks. Recent reports indicate a 40% surge in supply chain–related breaches compared to just two years ago, costing companies billions. Nearly one-third of all breaches now originate from third-party vendors or partners, as attackers exploit the interconnected nature of modern supply networks.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods

The Hacker News

The U.K. National Crime Agency (NCA) on Thursday announced that four people have been arrested in connection with cyber attacks targeting major retailers Marks & Spencer, Co-op, and Harrods. The arrested individuals include two men aged 19, a third aged 17, and a 20-year-old woman.

article thumbnail

Code highlighting with Cursor AI for $500,000

SecureList

Attacks that leverage malicious open-source packages are becoming a major and growing threat. This type of attacks currently seems commonplace, with reports of infected packages in repositories like PyPI or npm appearing almost daily. It would seem that increased scrutiny from researchers on these repositories should have long ago minimized the profits for cybercriminals trying to make a fortune from malicious packages.

Malware 145
article thumbnail

Critical SimpleHelp Vulnerability (CVE-2024-57727) Exploited by Ransomware Groups

Approachable Cyber Threats

Ransomware groups are actively exploiting a critical vulnerability in SimpleHelp RMM software. CVE-2024-57727 impacts versions 5.5.7 and earlier - and CISA says it’s being used in real-world attacks. Learn how to check if you’re at risk and what to do now to stay protected. Risk Level Read Time “What’s happening with SimpleHelp and CVE-2024-57727?” Ransomware actors are consistently exploiting a path traversal vulnerability, CVE-2024-57727, in SimpleHelp Remote Monitoring and Management (RMM) so

article thumbnail

UK Arrests Four in ‘Scattered Spider’ Ransom Group

Krebs on Security

Authorities in the United Kingdom this week arrested four people aged 17 to 20 in connection with recent data theft and extortion attacks against the retailers Marks & Spencer and Harrods , and the British food retailer Co-op Group. The breaches have been linked to a prolific but loosely-affiliated cybercrime group dubbed “ Scattered Spider ,” whose other recent victims include multiple airlines.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Laravel Flaw: Leaked APP_KEY Turns Into Remote Code Execution

Penetration Testing

Synacktiv reveals Laravel’s APP_KEY vulnerability allows RCE via deserialization attacks when the key is leaked or guessable, risking full application compromise.

Risk 87
article thumbnail

News alert: INE Security debuts advanced eMAPT certification to close mobile security talent gap

The Last Watchdog

Cary, NC, July 10, 2025, CyberNewsire — INE Security , a leading provider of cybersecurity education and cybersecurity certifications, today launched its significantly enhanced eMAPT (Mobile Application Penetration Testing) certification. The updated certification delivers the industry’s most comprehensive and practical approach to mobile application security testing.

Mobile 130
article thumbnail

Using Signal Groups for Activism

Schneier on Security

Schneier on Security Menu Blog Newsletter Books Essays News Talks Academic About Me Search Powered by DuckDuckGo Blog Essays Whole site Subscribe Home Blog Using Signal Groups for Activism Good tutorial by Micah Lee. It includes some nonobvious use cases. Tags: activism , encryption , Signal Posted on July 10, 2025 at 7:08 AM • 1 Comments Comments Winter • July 10, 2025 7:52 AM A reminder: If you think this is important, donate to Signal!

Adware 203
article thumbnail

Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord

The Hacker News

Cryptocurrency users are the target of an ongoing social engineering campaign that employs fake startup companies to trick users into downloading malware that can drain digital assets from both Windows and macOS systems.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

The Rise of Agentic AI: A New Frontier for API Security

Security Boulevard

The shift to agentic AI isn’t just a technical challenge — it’s a leadership opportunity for CISOs to redefine their role from control enforcer to strategic enabler. The post The Rise of Agentic AI: A New Frontier for API Security appeared first on Security Boulevard.

CISO 88
article thumbnail

ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs

The Hacker News

A high-severity security flaw has been disclosed in ServiceNow's platform that, if successfully exploited, could result in data exposure and exfiltration. The vulnerability, tracked as CVE-2025-3648 (CVSS score: 8.2), has been described as a case of data inference in Now Platform through conditional access control list (ACL) rules. It has been codenamed Count(er) Strike.

88
article thumbnail

Threat modeling as a dial, not a switch

Adam Shostack

Thinking of threat modeling with a knob helps you get more out of it. Lately, a lot of people have been asking me about what “triggers” threat modeling. The question confused me: you think about threats as part of any design decision! There are lots and lots of design decisions, ranging from tiny to enormous. For each, we ought to be asking what are their pros and cons?

article thumbnail

Cisco Catalyst 8300 Excels in NetSecOPEN NGFW SD-WAN Security Tests

Cisco Security

Skip to content Cisco Blogs / Security / Cisco Catalyst 8300 Excels in NetSecOPEN NGFW SD-WAN Security Tests July 10, 2025 Leave a Comment Security Cisco Catalyst 8300 Excels in NetSecOPEN NGFW SD-WAN Security Tests 2 min read Hugo Vliegen High Efficacy. High Throughput. Proven Security Performance That Meets Modern Connectivity Demands In cybersecurity — just like in Formula One racing — performance is only meaningful under pressure.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

4 Arrested in U.K. for Cyberattacks on Retail Tied to Scattered Spider

SecureWorld News

British authorities have arrested four individuals in connection with a series of cyberattacks that disrupted operations at major U.K. retailers—Marks & Spencer, Co-op, and Harrods—earlier this year. The National Crime Agency (NCA) announced the arrests on July 10th following a coordinated operation that targeted suspected members of the notorious hacking group known as Scattered Spider.

Retail 70
article thumbnail

Ingram Micro Ransomware Attack Shakes IT Supply Chain

Heimadal Security

Your weekly dose of the most urgent cyber threats is here. Adam Pilton distilled it all into five critical stories and five things you should actually do about them. Let’s get into it. Ingram Micro Ransomware Attack Disrupts Global IT Supply Chain Ingram Micro, the lifeline distributor for countless MSPs, was slammed by a SafePay […] The post Ingram Micro Ransomware Attack Shakes IT Supply Chain appeared first on Heimdal Security Blog.

article thumbnail

Why your AppSec Tool Stack Is Failing in the Age of AI

Security Boulevard

The world of software development is changing fast. AI isn’t just influencing software – it’s reshaping how software is written and the components it’s made of. First, AI-generated code is accelerating development. Code is produced faster, in larger volumes, and often without the same level of review or accountability as human-written code. Second, teams are.

article thumbnail

Thales AI Cybersecurity: Using AI, Protecting AI, Protecting Against AI

Thales Cloud Protection & Licensing

Thales AI Cybersecurity: Using AI, Protecting AI, Protecting Against AI madhav Thu, 07/10/2025 - 11:53 The growing threat of AI to cybersecurity and technology resources proved the prevailing topic at RSA this year, alongside the desire to harness its power positively and productively. According to the Thales 2025 Data Threat Report , 69% found a “fast-moving ecosystem” to be the most concerning GenAI security risk.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

New macOS.ZuRu Variant Uses Trojanized Termius App to Infiltrate Systems

Penetration Testing

SentinelOne uncovers a new macOS.ZuRu variant using a trojanized Termius app. It gains persistence via LaunchDaemon and deploys a Khepri C2 beacon for remote control.

Malware 78
article thumbnail

New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App

The Hacker News

Cybersecurity researchers have discovered new artifacts associated with an Apple macOS malware called ZuRu, which is known to propagate via trojanized versions of legitimate software. SentinelOne, in a new report shared with The Hacker News, said the malware has been observed masquerading as the cross‑platform SSH client and server‑management tool Termius in late May 2025.

Malware 105
article thumbnail

Apache HTTP Server 2.4.64 Released: Patches 8 Vulnerabilities, Including HTTP Splitting, SSRF & DoS

Penetration Testing

The post Apache HTTP Server 2.4.64 Released: Patches 8 Vulnerabilities, Including HTTP Splitting, SSRF & DoS appeared first on Daily CyberSecurity.

article thumbnail

Qantas Confirms Major Data Breach Impacting 5.7 Million Customers

Centraleyes

Qantas Airways has confirmed a large-scale data breach affecting approximately 5.7 million customers, following unauthorized access to a third-party vendor system supporting its customer contact operations. According to the airline, the breach occurred through an external platform used by an offshore call center partner. The compromised data includes names, email addresses, and Frequent Flyer numbers.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!