Tag: Exploitation
-
Simon Willison’s Weblog: When a Jira Ticket Can Steal Your Secrets
Source URL: https://simonwillison.net/2025/Aug/9/when-a-jira-ticket-can-steal-your-secrets/ Source: Simon Willison’s Weblog Title: When a Jira Ticket Can Steal Your Secrets Feedly Summary: When a Jira Ticket Can Steal Your Secrets Zenity Labs describe a classic lethal trifecta attack, this time against Cursor, MCP, Jira and Zendesk. They also have a short video demonstrating the issue. Zendesk support emails are…
-
The Register: Infosec hounds spot prompt injection vuln in Google Gemini apps
Source URL: https://www.theregister.com/2025/08/08/infosec_hounds_spot_prompt_injection/ Source: The Register Title: Infosec hounds spot prompt injection vuln in Google Gemini apps Feedly Summary: Not a very smart home: crims could hijack smart-home boiler, open and close powered windows and more. Now fixed Black hat A trio of researchers has disclosed a major prompt injection vulnerability in Google’s Gemini large…
-
The Register: German security researchers say ‘Windows Hell No’ to Microsoft biometrics for biz
Source URL: https://www.theregister.com/2025/08/07/windows_hello_hell_no/ Source: The Register Title: German security researchers say ‘Windows Hell No’ to Microsoft biometrics for biz Feedly Summary: Hello loophole could let a rogue admin, or a pwned one, inject new facial scans Black Hat Microsoft is pushing hard for Windows users to shift from using passwords to its Hello biometrics system,…
-
Docker: MCP Horror Stories: The Supply Chain Attack
Source URL: https://www.docker.com/blog/mcp-horror-stories-the-supply-chain-attack/ Source: Docker Title: MCP Horror Stories: The Supply Chain Attack Feedly Summary: This is Part 2 of our MCP Horror Stories series, an in-depth look at real-world security incidents exposing the vulnerabilities in AI infrastructure, and how the Docker MCP Toolkit delivers enterprise-grade protection. The Model Context Protocol (MCP) promised to be…
-
The Register: Microsoft, CISA warn yet another Exchange server bug can lead to ‘total domain compromise’
Source URL: https://www.theregister.com/2025/08/07/microsoft_cisa_warn_yet_another/ Source: The Register Title: Microsoft, CISA warn yet another Exchange server bug can lead to ‘total domain compromise’ Feedly Summary: No reported in-the-wild exploits…yet Microsoft and the feds late Wednesday sounded the alarm on another high-severity bug in Exchange Server hybrid deployments that could allow attackers to escalate privileges from on-premises Exchange…
-
The Register: CISA releases malware analysis for Sharepoint Server attack
Source URL: https://www.theregister.com/2025/08/07/cisa_releases_malware_analysis/ Source: The Register Title: CISA releases malware analysis for Sharepoint Server attack Feedly Summary: Indications of compromise and Sigma rules report for your security scanners amid ongoing ‘ToolShell’ blitz CISA has published a malware analysis report with compromise indicators and Sigma rules for “ToolShell" attacks targeting specific Microsoft SharePoint Server versions.… AI…
-
The Register: Meta training AI on social media posts? Only 7% in Europe think it’s OK
Source URL: https://www.theregister.com/2025/08/07/meta_training_ai_on_social/ Source: The Register Title: Meta training AI on social media posts? Only 7% in Europe think it’s OK Feedly Summary: Privacy campaigner Max Schrem’s NOYB is back on Zuck’s back Meta’s enthusiasm for training its AI on user data is not shared by the users themselves – at least for some Europeans…
-
Unit 42: When Good Accounts Go Bad: Exploiting Delegated Managed Service Accounts in Active Directory
Source URL: https://unit42.paloaltonetworks.com/badsuccessor-attack-vector/ Source: Unit 42 Title: When Good Accounts Go Bad: Exploiting Delegated Managed Service Accounts in Active Directory Feedly Summary: BadSuccessor is an attack vector in Windows Server 2025. Under certain conditions it allows privilege elevation via dMSAs. We analyze its mechanics. The post When Good Accounts Go Bad: Exploiting Delegated Managed Service…
-
The Register: Vibe coding tool Cursor’s MCP implementation allows persistent code execution
Source URL: https://www.theregister.com/2025/08/05/mcpoison_bug_abuses_cursor_mcp/ Source: The Register Title: Vibe coding tool Cursor’s MCP implementation allows persistent code execution Feedly Summary: More evidence that AI expands the attack surface Check Point researchers uncovered a remote code execution bug in popular vibe-coding AI tool Cursor that could allow an attacker to poison developer environments by secretly modifying a…
-
Embrace The Red: Amp Code: Arbitrary Command Execution via Prompt Injection Fixed
Source URL: https://embracethered.com/blog/posts/2025/amp-agents-that-modify-system-configuration-and-escape/ Source: Embrace The Red Title: Amp Code: Arbitrary Command Execution via Prompt Injection Fixed Feedly Summary: Sandbox-escape-style attacks can happen when an AI is able to modify its own configuration settings, such as by writing to configuration files. That was the case with Amp, an agentic coding tool built by Sourcegraph. The…