Tag: attack

  • Alerts: CISA Adds Two Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/03/18/cisa-adds-two-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Two Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-24472 Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability CVE-2025-30066 tj-actions/changed-files GitHub Action Embedded Malicious Code Vulnerability These types of vulnerabilities are frequent…

  • Alerts: Supply Chain Compromise of Third-Party GitHub Action, CVE-2025-30066

    Source URL: https://www.cisa.gov/news-events/alerts/2025/03/18/supply-chain-compromise-third-party-github-action-cve-2025-30066 Source: Alerts Title: Supply Chain Compromise of Third-Party GitHub Action, CVE-2025-30066 Feedly Summary: A popular third-party GitHub Action, tj-actions/changed-files (tracked as CVE-2025-30066), was compromised. This GitHub Action is designed to detect which files have changed in a pull request or commit. The supply chain compromise allows for information disclosure of secrets including,…

  • Hacker News: North Korea Launders Billions in Stolen Crypto

    Source URL: https://www.coindesk.com/policy/2025/03/07/here-s-how-north-korea-launders-billions-of-stolen-crypto Source: Hacker News Title: North Korea Launders Billions in Stolen Crypto Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the complex methods used by North Korea to launder cryptocurrency stolen through hacks, particularly focusing on their reliance on over-the-counter brokers and other methods due to compliance checks implemented…

  • Cloud Blog: Cloud CISO Perspectives: 5 tips for secure AI success

    Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-5-tips-secure-ai-success/ Source: Cloud Blog Title: Cloud CISO Perspectives: 5 tips for secure AI success Feedly Summary: Welcome to the first Cloud CISO Perspectives for March 2025. Today, Royal Hansen, vice-president, Engineering, and Nick Godfrey, Office of the CISO senior director, discuss how new AI Protection capabilities in Security Command Center fit in with…

  • Hacker News: Microsoft isn’t fixing 8-year-old shortcut exploit abused for spying

    Source URL: https://www.theregister.com/2025/03/18/microsoft_trend_flaw/ Source: Hacker News Title: Microsoft isn’t fixing 8-year-old shortcut exploit abused for spying Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a vulnerability identified by Trend Micro that has been exploited in a prolonged espionage campaign, highlighting Microsoft’s response (or lack thereof) to the issue. It underscores the…