Tag: day exploits

  • Cloud Blog: Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457)

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability/ Source: Cloud Blog Title: Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457) Feedly Summary: Written by: John Wolfram, Michael Edie, Jacob Thompson, Matt Lin, Josh Murchie On Thursday, April 3, 2025, Ivanti disclosed a critical security vulnerability, CVE-2025-22457, impacting Ivanti Connect Secure (“ICS”) VPN appliances version 22.7R2.5 and…

  • Hacker News: There are perhaps 10k reasons to doubt Oracle Cloud’s security breach denial

    Source URL: https://www.theregister.com/2025/03/25/oracle_breach_update/ Source: Hacker News Title: There are perhaps 10k reasons to doubt Oracle Cloud’s security breach denial Feedly Summary: Comments AI Summary and Description: Yes Summary: The text describes a dispute regarding Oracle Cloud’s denial of a security breach after an infosec researcher claims that sensitive data, including customer security keys and credentials,…

  • Cloud Blog: Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-targets-juniper-routers/ Source: Cloud Blog Title: Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers Feedly Summary: Written by: Lukasz Lamparski, Punsaen Boonyakarn, Shawn Chew, Frank Tse, Jakub Jozwiak, Mathew Potaczek, Logeswaran Nadarajan, Nick Harbour, Mustafa Nasser Introduction In mid 2024, Mandiant discovered threat actors deployed custom backdoors on Juniper Networks’ Junos…

  • The Register: China’s Silk Typhoon, tied to US Treasury break-in, now hammers IT and govt targets

    Source URL: https://www.theregister.com/2025/03/05/china_silk_typhoon_update/ Source: The Register Title: China’s Silk Typhoon, tied to US Treasury break-in, now hammers IT and govt targets Feedly Summary: They’re good at zero-day exploits, too Silk Typhoon, the Chinese government crew believed to be behind the December US Treasury intrusions, has been abusing stolen API keys and cloud credentials in ongoing…

  • Cloud Blog: Cybercrime: A Multifaceted National Security Threat

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/cybercrime-multifaceted-national-security-threat/ Source: Cloud Blog Title: Cybercrime: A Multifaceted National Security Threat Feedly Summary: Executive Summary Cybercrime makes up a majority of the malicious activity online and occupies the majority of defenders’ resources. In 2024, Mandiant Consulting responded to almost four times more intrusions conducted by financially motivated actors than state-backed intrusions. Despite this…

  • The Register: FortiGate config leaks: Victims’ email addresses published online

    Source URL: https://www.theregister.com/2025/01/23/fortigate_config_leaks_infoseccers_list_victim_emails/ Source: The Register Title: FortiGate config leaks: Victims’ email addresses published online Feedly Summary: Experts warn not to take leaks lightly as years-long compromises could remain undetected Thousands of email addresses included in the Belsen Group’s dump of FortiGate configs last week are now available online, revealing which organizations may have been…

  • Hacker News: Hackers exploit 16 zero-days on first day of Pwn2Own Automotive 2025

    Source URL: https://www.bleepingcomputer.com/news/security/hackers-exploit-16-zero-days-on-first-day-of-pwn2own-automotive-2025/ Source: Hacker News Title: Hackers exploit 16 zero-days on first day of Pwn2Own Automotive 2025 Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides a detailed report on the outcomes of the Pwn2Own Automotive 2025 hacking competition, highlighting the successful exploitation of zero-day vulnerabilities relating to electric vehicle chargers…