Tag: attack

  • The Register: Infosec pro Troy Hunt HasBeenPwned in Mailchimp phish

    Source URL: https://www.theregister.com/2025/03/25/troy_hunt_mailchimp_phish/ Source: The Register Title: Infosec pro Troy Hunt HasBeenPwned in Mailchimp phish Feedly Summary: 16,000 stolen records pertain to former and active mail subscribers Infosec veteran Troy Hunt of HaveIBeenPwned fame is notifying thousands of people after phishers scooped up his Mailchimp mailing list.… AI Summary and Description: Yes Summary: The incident…

  • The Register: VanHelsing ransomware emerges to put a stake through your Windows heart

    Source URL: https://www.theregister.com/2025/03/25/vanhelsing_ransomware_russia/ Source: The Register Title: VanHelsing ransomware emerges to put a stake through your Windows heart Feedly Summary: There’s only one rule – don’t attack Russia, duh Check Point has spotted a fresh ransomware-as-a-service crew in town: VanHelsing, touting a cross-platform locker targeting Microsoft Windows, Linux, and VMware ESXi systems, among others. But…

  • The Register: Hm, why are so many DrayTek routers stuck in a bootloop?

    Source URL: https://www.theregister.com/2025/03/25/draytek_routers_bootloop/ Source: The Register Title: Hm, why are so many DrayTek routers stuck in a bootloop? Feedly Summary: Time to update your firmware, if you can, to one with the security fixes, cough cough DrayTek router owners in the UK and beyond had a pretty miserable weekend after some ISPs began to notice…

  • Hacker News: RCE Vulnerabilities in K8s Ingress Nginx (9.8 CVE for ingress-Nginx)

    Source URL: https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities Source: Hacker News Title: RCE Vulnerabilities in K8s Ingress Nginx (9.8 CVE for ingress-Nginx) Feedly Summary: Comments AI Summary and Description: Yes ### Summary: The text outlines the discovery of significant vulnerabilities in the Ingress NGINX Controller for Kubernetes, known as IngressNightmare. These vulnerabilities, which allow unauthenticated Remote Code Execution (RCE), pose…

  • The Register: Public-facing Kubernetes clusters at risk of takeover thanks to Ingress-Nginx flaw

    Source URL: https://www.theregister.com/2025/03/25/kubernetes_flaw_rce_risk/ Source: The Register Title: Public-facing Kubernetes clusters at risk of takeover thanks to Ingress-Nginx flaw Feedly Summary: How many K8s systems are sat on the internet front porch like that … Oh, thousands, apparently Cloudy infosec outfit Wiz has discovered serious vulnerabilities in the admission controller component of Ingress-Nginx Controller that could…

  • Hacker News: New Jailbreak Technique Uses Fictional World to Manipulate AI

    Source URL: https://www.securityweek.com/new-jailbreak-technique-uses-fictional-world-to-manipulate-ai/ Source: Hacker News Title: New Jailbreak Technique Uses Fictional World to Manipulate AI Feedly Summary: Comments AI Summary and Description: Yes Summary: Cato Networks has identified a new LLM jailbreak technique named Immersive World, which enables AI models to assist in malware development by creating a simulated environment. This discovery highlights significant…

  • The Register: As nation-state hacking becomes ‘more in your face,’ are supply chains secure?

    Source URL: https://www.theregister.com/2025/03/24/nation_state_supply_chain_attack/ Source: The Register Title: As nation-state hacking becomes ‘more in your face,’ are supply chains secure? Feedly Summary: Ex-US Air Force officer says companies shouldn’t wait for govt mandates Interview Former US Air Force cyber officer Sarah Cleveland worries about the threat of a major supply-chain attack from China or another adversarial…

  • Alerts: CISA Adds One Known Exploited Vulnerability to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/03/24/cisa-adds-one-known-exploited-vulnerability-catalog Source: Alerts Title: CISA Adds One Known Exploited Vulnerability to Catalog Feedly Summary: CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-30154 reviewdog action-setup GitHub Action Embedded Malicious Code Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and…

  • Microsoft Security Blog: Microsoft unveils Microsoft Security Copilot agents and new protections for AI

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/03/24/microsoft-unveils-microsoft-security-copilot-agents-and-new-protections-for-ai/ Source: Microsoft Security Blog Title: Microsoft unveils Microsoft Security Copilot agents and new protections for AI Feedly Summary: Learn about the upcoming availability of Microsoft Security Copilot agents and other new offerings for a more secure AI future. The post Microsoft unveils Microsoft Security Copilot agents and new protections for AI appeared…

  • Rekt: Zoth – Rekt

    Source URL: https://www.rekt.news/zoth-rekt Source: Rekt Title: Zoth – Rekt Feedly Summary: Admin keys stolen, $8.4M drained in minutes through a malicious contract upgrade. Zoth suffers two hacks in three weeks – first for logic, now for keys. Auditing code is easy. Auditing the humans behind it? That’s where protocols bleed out. AI Summary and Description:…