Tag: Exploitation

  • Alerts: CISA Adds Four Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/03/04/cisa-adds-four-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Four Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-50302 Linux Kernel Use of Uninitialized Resource Vulnerability CVE-2025-22225 VMware ESXi Arbitrary Write Vulnerability CVE-2025-22224 VMware ESXi and Workstation TOCTOU Race Condition Vulnerability CVE-2025-22226 VMware ESXi,…

  • The Register: Microsoft signed a dodgy driver and now ransomware scum are exploiting it

    Source URL: https://www.theregister.com/2025/03/04/paragon_partition_manager_ransomware_driver/ Source: The Register Title: Microsoft signed a dodgy driver and now ransomware scum are exploiting it Feedly Summary: Five flaws found in Paragon Partition Manager’s kernel-level .sys Ransomware crooks are exploiting a third-party Windows kernel-level driver used and provided by disk management tool Paragon Partition Manager.… AI Summary and Description: Yes Summary:…

  • Alerts: CISA Adds Five Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/03/03/cisa-adds-five-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Five Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-20118 Cisco Small Business RV Series Routers Command Injection Vulnerability CVE-2022-43939 Hitachi Vantara Pentaho BA Server Authorization Bypass Vulnerability CVE-2022-43769 Hitachi Vantara Pentaho BA Server…

  • The Register: US Cyber Command reportedly pauses cyberattacks on Russia

    Source URL: https://www.theregister.com/2025/03/03/infosec_in_brief/ Source: The Register Title: US Cyber Command reportedly pauses cyberattacks on Russia Feedly Summary: PLUS: Phishing suspects used fishing gear as alibi; Apple’s ‘Find My’ can track PCs and Androids; and more Infosec In Brief US Defense Secretary Pete Hegseth has reportedly ordered US Cyber Command to pause offensive operations against Russia,…

  • Hacker News: Mozilla is trying to backtrack on Firefox’s controversial data privacy update

    Source URL: https://www.pcgamer.com/gaming-industry/mozilla-is-already-trying-to-backtrack-on-firefoxs-controversial-data-privacy-update-but-it-might-be-too-little-too-late/ Source: Hacker News Title: Mozilla is trying to backtrack on Firefox’s controversial data privacy update Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the controversy surrounding Mozilla’s recent update to the Terms of Use for Firefox, which has sparked outrage among users due to concerns over data privacy.…

  • Slashdot: Serbian Student’s Android Phone Compromised By Exploit From Cellebrite

    Source URL: https://it.slashdot.org/story/25/03/01/019202/serbian-students-android-phone-compromised-by-exploit-from-cellebrite?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Serbian Student’s Android Phone Compromised By Exploit From Cellebrite Feedly Summary: AI Summary and Description: Yes Summary: The report illustrates a concerning case of a zero-day exploit utilized by a surveillance vendor against a student critic of the Serbian government, highlighting the ongoing threats to information security in civil…

  • The Register: Ransomware criminals love CISA’s KEV list – and that’s a bug, not a feature

    Source URL: https://www.theregister.com/2025/02/28/cisa_kev_list_ransomware/ Source: The Register Title: Ransomware criminals love CISA’s KEV list – and that’s a bug, not a feature Feedly Summary: 1 in 3 entries are used to extort civilians, says new paper Fresh research suggests attackers are actively monitoring databases of vulnerabilities that are known to be useful in carrying out ransomware…