Fri.Jul 18, 2025

article thumbnail

CVE-2025-54309: CrushFTP Targeted in Active Exploits Due to Unpatched Zero-Day Vulnerability

Penetration Testing

CrushFTP has issued an urgent advisory for CVE-2025-54309, a critical zero-day allowing remote exploitation via HTTP(S), already being actively used in the wild.

article thumbnail

Broadcom patches critical VMware flaws exploited at Pwn2Own Berlin 2025

Security Affairs

VMware patched flaws disclosed during the Pwn2Own Berlin 2025 hacking contest, where researchers earned $340,000 for exploiting them. Broadcom four vulnerabilities in VMware products demonstrated at Pwn2Own Berlin 2025. White hat hackers earned over $340,000 for VMware exploits, including $150,000 awarded to STARLabs SG for using an integer overflow flaw to compromise VMware ESXi.

Hacking 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Sues BadBox 2.0 Botnet Operators, Protecting 10 Million+ Infected Android Devices

Penetration Testing

Google is suing the operators of BadBox 2.0, one of the world's largest smart TV botnets, to combat digital fraud and protect over 10 million infected Android devices.

Malware 60
article thumbnail

5 Features Every AI-Powered SOC Platform Needs in 2025

Security Affairs

A modern AI-based SOC platform must adapt in real time to handle alert overloads and fast-moving threats, surpassing traditional SIEM tools. Modern security operations centers (SOCs) are under immense pressure. Analysts are overwhelmed, alert queues are overflowing, and attackers are moving faster than ever. Where once it was enough to have good visibility and a decent SIEM, security operations today require need platforms that can think, act, and adapt in real time.

Risk 64
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Grafana Patches XSS (CVE-2025-6023) and Open Redirect (CVE-2025-6197) Flaws in Recent Security Release

Penetration Testing

The post Grafana Patches XSS (CVE-2025-6023) and Open Redirect (CVE-2025-6197) Flaws in Recent Security Release appeared first on Daily CyberSecurity.

article thumbnail

Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services

The Hacker News

Cybersecurity researchers have disclosed a critical container escape vulnerability in the NVIDIA Container Toolkit that could pose a severe threat to managed AI cloud services. The vulnerability, tracked as CVE-2025-23266, carries a CVSS score of 9.0 out of 10.0. It has been codenamed NVIDIAScape by Google-owned cloud security company Wiz.

LifeWorks

More Trending

article thumbnail

Nvidia Flaws Expose Jetson AI & Robotics Platforms to RCE and Data Theft

Penetration Testing

Nvidia released patches for critical vulnerabilities (CVE-2025-23270, CVE-2025-23269) in Jetson Linux and IGX, allowing RCE, data tampering, and info disclosure.

article thumbnail

Authorities released free decryptor for Phobos and 8base ransomware

Security Affairs

Japanese police released a free decryptor for Phobos and 8Base ransomware, letting victims recover files without paying ransom. Japanese authorities released a free decryptor for Phobos and 8Base ransomware , allowing victims to recover files without paying. Japanese police released the free decryptor for ransomware families, which was likely built using intel from a recent gang takedown.

article thumbnail

KAWA4096: New Ransomware Blends Qilin & Akira Tactics, Hits US and Japan

Penetration Testing

A new ransomware, KAWA4096, combines features from Qilin and Akira, targeting organizations in the US and Japan with multi-threaded encryption and anti-recovery measures.

article thumbnail

Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks

The Hacker News

Cybersecurity researchers have disclosed details of a new malware called MDifyLoader that has been observed in conjunction with cyber attacks exploiting security flaws in Ivanti Connect Secure (ICS) appliances.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

CVE-2025-4660 (CVSS 8.7) in Forescout SecureConnector Allows Remote Endpoint Hijack, PoC Publishes

Penetration Testing

NetSPI uncovered CVE-2025-4660 in Forescout SecureConnector, allowing unauthenticated attackers to hijack endpoints remotely via a misconfigured named pipe.

article thumbnail

Google Sues the Operators Behind the BadBox 2.0 Botnet

Security Boulevard

Google is suing the operators behind BadBox 2.0, accusing multiple Chinese threat groups of playing different roles in the operation of the massive botnet that rolled up more than 10 million devices to run large-scale ad fraud and other malicious campaigns. The post Google Sues the Operators Behind the BadBox 2.0 Botnet appeared first on Security Boulevard.

article thumbnail

Major npm Supply Chain Attack: Phishing Campaign Steals Maintainer Credentials, Injects Malware into Popular Packages

Penetration Testing

The post Major npm Supply Chain Attack: Phishing Campaign Steals Maintainer Credentials, Injects Malware into Popular Packages appeared first on Daily CyberSecurity.

article thumbnail

From Backup to Cyber Resilience: Why IT Leaders Must Rethink Backup in the Age of Ransomware

The Hacker News

With IT outages and disruptions escalating, IT teams are shifting their focus beyond simply backing up data to maintaining operations during an incident. One of the key drivers behind this shift is the growing threat of ransomware, which continues to evolve in both frequency and complexity.

Backups 103
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

FortiWeb SQL Injection (CVE-2025-25257) Added to CISA KEV After Active Exploitation, PoC Available!

Penetration Testing

CISA added CVE-2025-25257, a critical FortiWeb SQL injection vulnerability (CVSS 9.6), to its KEV Catalog, confirming active exploitation in the wild. Update immediately!

article thumbnail

The Challenges of Operationalizing Threat Intelligence

Security Boulevard

Most security teams subscribe to more threat‑intel feeds than they can digest, yet attackers keep winning. Cyware’s Jawahar Sivasankaran explains why: Outside the Fortune 500 and federal agencies, many organizations still treat cyberthreat intelligence (CTI) as another inbox rather than an engine for action. They know intel is “absolutely critical,” but legacy tools and skill gaps.

article thumbnail

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

The Hacker News

Google on Thursday revealed it's pursuing legal action in New York federal court against 25 unnamed individuals or entities in China for allegedly operating BADBOX 2.0 botnet and residential proxy infrastructure. "The BADBOX 2.

Software 117
article thumbnail

Summer Vacation Alert Surfaces More Than 5 Million Unsecured Wi-Fi Networks

Security Boulevard

Zimperium, a provider of mobile security software, this week published a report that notes more than 5 million unsecured public Wi-Fi networks have been detected globally since the beginning of 2025 The post Summer Vacation Alert Surfaces More Than 5 Million Unsecured Wi-Fi Networks appeared first on Security Boulevard.

Mobile 88
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

NVIDIA Issues Advisory After Demo of First Rowhammer Attack on GPUs

Tech Republic Security

Researchers recently demoed GPUHammer, the first Rowhammer-style exploit targeting GPU memory, posing major threats to AI reliability and data integrity.

article thumbnail

CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign

The Hacker News

The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a phishing campaign that's designed to deliver a malware codenamed LAMEHUG. "An obvious feature of LAMEHUG is the use of LLM (large language model), used to generate commands based on their textual representation (description)," CERT-UA said in a Thursday advisory.

article thumbnail

Cambodia Arrests More Than 1,000 in Cyberscam Crackdown

Security Boulevard

Cambodian police and military arrested more than 1,000 people in a crackdown on cyberscam operations that have proliferated in recent years in Southeast Asia and now are spreading globally, ensnaring hundreds of thousands of people in human trafficking schemes who are forced to run romance and other online frauds. The post Cambodia Arrests More Than 1,000 in Cyberscam Crackdown appeared first on Security Boulevard.

article thumbnail

UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns

The Hacker News

Multiple sectors in China, Hong Kong, and Pakistan have become the target of a threat activity cluster tracked as UNG0002 (aka Unknown Group 0002) as part of a broader cyber espionage campaign.

111
111
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

LameHug: first AI-Powered malware linked to Russia’s APT28

Security Affairs

LameHug malware uses AI to create data-theft commands on infected Windows systems. Ukraine links it to the Russia-nexus APT28 group. Ukrainian CERT-UA warns of a new malware strain dubbed LameHug that uses a large language model (LLM) to generate commands to be executed on compromised Windows systems. Ukrainian experts attribute the malware to the Russia-linked group APT28 (aka UAC-0001, Fancy Bear , Pawn Storm , Sofacy Group , Sednit , BlueDelta, and STRONTIUM ). “An obvious feature

Malware 84
article thumbnail

Why Most Mobile App Security Tools Miss Geo-Risk? How to Fix It?

Appknox

The risk that goes unseen Most mobile security conversations start with code: vulnerabilities, misconfigurations, tokens, and flaws. But few discussions focus on a critical dimension— location : not where an app is used, but where its data travels.

Mobile 52
article thumbnail

Anne Arundel Dermatology data breach impacts 1.9 million people

Security Affairs

Hackers breached Anne Arundel Dermatology systems for three months, potentially exposing personal and health data of 1.9 million people. Anne Arundel Dermatology is a physician-owned and managed dermatology group headquartered in Maryland, founded over 50 years ago. It’s one of the largest dermatology providers in the Mid‑Atlantic and Southeastern United States, operating more than 100 clinics across seven states with over 275 clinicians.

article thumbnail

Loaf and order: Belgian police launch bread-based cybersecurity campaign

Graham Cluley

The future of cybersecurity awareness might just be… gluten-based.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

China's Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones

The Hacker News

Cybersecurity researchers have shed light on a mobile forensics tool called Massistant that's used by law enforcement authorities in China to gather information from seized mobile devices. The hacking tool, believed to be a successor of MFSocket, is developed by a Chinese company named SDIC Intelligence Xiamen Information Co., Ltd., which was formerly known as Meiya Pico.

Mobile 136
article thumbnail

Critical MCP Vulnerabilities are Slipping Through the Cracks

Security Boulevard

We must pay attention to what holds everything together - the glue. That’s where the real MCP vulnerabilities are hiding. The post Critical MCP Vulnerabilities are Slipping Through the Cracks appeared first on Security Boulevard.

article thumbnail

New Mobile Phone Forensics Tool

Schneier on Security

The Chinese have a new tool called Massistant. Massistant is the presumed successor to Chinese forensics tool, “MFSocket”, reported in 2019 and attributed to publicly traded cybersecurity company, Meiya Pico. The forensics tool works in tandem with a corresponding desktop software. Massistant gains access to device GPS location data, SMS messages, images, audio, contacts and phone services.

Mobile 241
article thumbnail

Mark Zuckerberg & Meta Directors Settle $8 Billion Privacy Lawsuit Over Cambridge Analytica

Penetration Testing

Mark Zuckerberg and other Meta executives have settled an $8 billion shareholder lawsuit linked to repeated privacy violations from the 2018 Cambridge Analytica scandal.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!