Tue.Jun 10, 2025

article thumbnail

Patch Tuesday, June 2025 Edition

Krebs on Security

Microsoft today released security updates to fix at least 67 vulnerabilities in its Windows operating systems and software. Redmond warns that one of the flaws is already under active attack, and that software blueprints showing how to exploit a pervasive Windows bug patched this month are now public. The sole zero-day flaw this month is CVE-2025-33053 , a remote code execution flaw in the Windows implementation of WebDAV — an HTTP extension that lets users remotely manage files and direct

Software 196
article thumbnail

Insyde UEFI Flaw (CVE-2025-4275): Secure Boot Bypass Allows Rootkits & Undetectable Malware

Penetration Testing

A Insyde H2O UEFI flaw (CVE-2025-4275) allows Secure Boot bypass via NVRAM, enabling attackers to inject undetectable malware and rootkits. Update firmware now!

Firmware 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Cisco plans to stop rogue AI agent attacks inside your network

Zero Day

As AI agents grow more powerful and unpredictable, Cisco unveils tools to lock down networks, track agent behavior, and prevent chaos before it spreads through your infrastructure.

99
article thumbnail

Whole Foods Supplier United Natural Foods Hit in Cyber Attack

SecureWorld News

United Natural Foods Inc. (UNFI), the largest publicly traded wholesale distributor in the United States, is the latest victim in a string of cyberattacks targeting the supply chain. The company disclosed a cybersecurity incident earlier this week that temporarily disrupted parts of its operations and sent its stock tumbling more than 9%. UNFI supplies a vast ecosystem of retailers, including Whole Foods Market, which relies heavily on its distribution network.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account

The Hacker News

Google has stepped in to address a security flaw that could have made it possible to brute-force an account's recovery phone number, potentially exposing them to privacy and security risks. The issue, according to Singaporean security researcher "brutecat," leverages an issue in the company's account recovery feature.

article thumbnail

Mirai botnets exploit Wazuh RCE, Akamai warned

Security Affairs

Mirai botnets are exploiting CVE-2025-24016, a critical remote code execution flaw in Wazuh servers, Akamai warned. Akamai researchers warn that multiple Mirai botnets exploit the critical remote code execution vulnerability CVE-2025-24016 (CVSS score of 9.9) affecting Wazuh servers. Wazuh is an open-source security platform used for threat detection, intrusion detection, log data analysis, and compliance monitoring.

LifeWorks

More Trending

article thumbnail

SAP June 2025 Security Patch Day fixed critical NetWeaver bug

Security Affairs

SAP fixed a critical NetWeaver flaw that let attackers bypass authorization and escalate privileges. Patch released in June 2025 Security Patch. SAP June 2025 Security Patch addressed a critical NetWeaver vulnerability, tracked as CVE-2025-42989 (CVSS score of 9.6), allowing threat actors to bypass authorization checks and escalate their privileges. “RFC inbound processing does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.̶

article thumbnail

FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

The Hacker News

The financially motivated threat actor known as FIN6 has been observed leveraging fake resumes hosted on Amazon Web Services (AWS) infrastructure to deliver a malware family called More_eggs.

Malware 106
article thumbnail

High-Severity Flaw in Kibana: Unauthorized Access Possible in Synthetic Monitoring!

Penetration Testing

A high-severity flaw (CVE-2024-43706) in Kibana's Synthetic Monitoring allows unauthorized access. Upgrade to 8.12.1 or apply mitigations immediately.

article thumbnail

The New Frontier: How AI Is Reshaping Security and Technology Delivery

SecureWorld News

Throughout the past year, artificial intelligence has gone from being a promising tool to a foundational force reshaping how we design, build, and secure technology. The velocity of this transformation is staggering—and so are the implications to productivity, as well as security. Security in a machine-accelerated world The state of cybersecurity is as complex as it has ever been, maybe more.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

CoreDNS DoS Flaw: Unauthenticated Attackers Can Crash Servers via DNS-over-QUIC

Penetration Testing

A DoS flaw in CoreDNS (CVE-2025-47950) allows unauthenticated attackers to crash servers using DNS-over-QUIC. Update to 1.12.2 immediately or disable QUIC.

DNS 85
article thumbnail

Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps

The Hacker News

Adobe on Tuesday pushed security updates to address a total of 254 security flaws impacting its software products, a majority of which affect Experience Manager (AEM). Of the 254 flaws, 225 reside in AEM, impacting AEM Cloud Service (CS) as well as all versions prior to and including 6.5.22. The issues have been resolved in AEM Cloud Service Release 2025.5 and version 6.5.23.

article thumbnail

Chrome Update Alert: Two High-Severity Flaws Patched – Update Now to Stay Safe!

Penetration Testing

Google Chrome 137.0.7151.103/.104 fixes two high-severity flaws in media and V8. Update now to protect your system from potential compromise.

Media 93
article thumbnail

Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices

Trend Micro

Learn how Trend's Cybertron has been harnessing the power of NVIDIA Universal LLM NIM Microservices.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

The Hacker News

Cybersecurity researchers have uncovered over 20 configuration-related risks affecting Salesforce Industry Cloud (aka Salesforce Industries), exposing sensitive data to unauthorized internal and external parties. The weaknesses affect various components like FlexCards, Data Mappers, Integration Procedures (IProcs), Data Packs, OmniOut, and OmniScript Saved Sessions.

Risk 87
article thumbnail

HPE Aruba Networking Patches Sensitive Data Exposure Vulnerability in Private 5G Core Platform

Penetration Testing

A high-severity flaw (CVE-2025-37100) in HPE Aruba Private 5G Core allows unauthorized access to sensitive system files. Update to 1.25.1.1 immediately!

article thumbnail

44% of people encounter a mobile scam every single day, Malwarebytes finds

Malwarebytes

It’s become so troublesome owning a phone. Malicious texts pose as package delivery notifications, phishing emails impersonate trusted brands, and unknown calls hide extortion attempts, virtual kidnapping schemes, or AI threats. Confusingly, even legitimate businesses now lean on outreach tactics that have long been favored by online scammers—asking people to scan QR codes, download mobile apps, and trade direct messages with, essentially, strangers.

Scams 89
article thumbnail

The Hidden Threat in Your Stack: Why Non-Human Identity Management is the Next Cybersecurity Frontier

The Hacker News

Modern enterprise networks are highly complex environments that rely on hundreds of apps and infrastructure services. These systems need to interact securely and efficiently without constant human oversight, which is where non-human identities (NHIs) come in.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

AI Ready: The Complete Guide to AI-Powered Cybersecurity Training in 2025/2026

Security Boulevard

Introduction: The AI Cybersecurity Crisis The cybersecurity landscape has fundamentally changed. AI-powered cyberattacks are projected to surge by 50% in 2024 compared to 2021, with Gartner research showing a 63% increase since 2023. Meanwhile, 87% of organizations report an explosion in AI-powered cyberattack frequency and sophistication. The stakes have never been higher.

article thumbnail

Operation Secure: Trend Micro's Threat Intelligence Fuels INTERPOL's Infostealer Infrastructure Takedown 

Trend Micro

In this blog, we discuss how Trend Micro played a pivotal role in Operation Secure, a multi-national law enforcement effort that dismantled the infrastructure behind widespread infostealer malware campaigns across Asia and the Pacific.

Malware 73
article thumbnail

The Summer Online Safety Guide for Kids

Security Through Education

School’s out, the sun is shining—and kids are spending more time online than ever. Whether it’s endless YouTube videos, Roblox marathons, or group chats with friends, the internet becomes a big part of summer fun. But with that freedom comes real risk. From online predators and unsafe content to digital peer pressure and oversharing, children face a wide range of online dangers—often without even realizing it.

article thumbnail

Ivanti Patches High-Severity Credential Decryption Flaws in Workspace Control

Penetration Testing

Ivanti patches three Workspace Control flaws exposing sensitive credentials due to hardcoded keys. Update immediately to secure your enterprise.

73
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

U.S. CISA adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added RoundCube Webmail and Erlang Erlang/OTP SSH server flaws to its Known Exploited Vulnerabilities (KEV) catalog.

article thumbnail

CVSS 9.8: Backend.AI Critical Flaw Allows Account Takeover via PoC, No Patch Available

Penetration Testing

A critical CVSS 9.8 flaw (CVE-2025-49653) in Backend.AI allows account takeover via PoC, impacting all versions. Vendor has not issued a patch.

article thumbnail

Apple Intelligence Is Gambling on Privacy as a Killer Feature

WIRED Threat Level

Many new Apple Intelligence features happen on your device rather than in the cloud. While it may not be flashy, the privacy-centric approach could be a competitive advantage.

73
article thumbnail

Avaya CMS Exposed to Unauthorized Remote Command Attacks: CVSS 9.9 Vulnerability Demands Urgent Fix

Penetration Testing

Skip to content June 11, 2025 Linkedin Twitter Facebook Youtube Daily CyberSecurity Primary Menu Home Cyber Security Cybercriminals Data Leak Linux Malware Attack Open Source Tool Technology Vulnerability Submit Press Release Search for: Home News Vulnerability Avaya CMS Exposed to Unauthorized Remote Command Attacks: CVSS 9.9 Vulnerability Demands Urgent Fix Vulnerability Avaya CMS Exposed to Unauthorized Remote Command Attacks: CVSS 9.9 Vulnerability Demands Urgent Fix Ddos June 10, 2025 🔐 Ac

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

5 Common Ways Non-Human Identities Are Exploited – and How to Secure Them

Security Boulevard

4 min read Discover the emerging class of attacks involving software workloads and AI agents. The post 5 Common Ways Non-Human Identities Are Exploited – and How to Secure Them appeared first on Aembit. The post 5 Common Ways Non-Human Identities Are Exploited – and How to Secure Them appeared first on Security Boulevard.

article thumbnail

Critical Command Injection Flaw in KDE Konsole Exposes Users to Arbitrary Code Execution

Penetration Testing

A critical Konsole vulnerability allows arbitrary code execution via a telnet:// URL scheme. Linux users must update to 25.04.2 immediately.

article thumbnail

Cyberattack Disrupts Whole Foods Supplier, Causing Delivery Delays and Empty Shelves

eSecurity Planet

United Natural Foods Inc. (UNFI), one of the largest grocery distributors in North America and the main supplier for Amazon-owned Whole Foods, has confirmed that it was hit by a cyberattack that has disrupted its operations. The ripple effects are now hitting grocery shelves. The Rhode Island-based company revealed in a June 9 filing with the Securities and Exchange Commission (SEC) that it discovered “unauthorized activity” on parts of its IT network on June 5.

Retail 67
article thumbnail

Salesforce OmniStudio Flaws Expose Encrypted Data

Penetration Testing

High-severity flaws in Salesforce OmniStudio's FlexCard and Data Mapper expose encrypted customer data. Learn how to protect your organization.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!