Tag: Exploitation
-
Alerts: CISA Adds One Known Exploited Vulnerability to Catalog
Source URL: https://www.cisa.gov/news-events/alerts/2025/01/29/cisa-adds-one-known-exploited-vulnerability-catalog Source: Alerts Title: CISA Adds One Known Exploited Vulnerability to Catalog Feedly Summary: CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation, as confirmed by Fortinet. CVE-2025-24085 Apple Multiple Products Use-After-Free Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors…
-
The Register: Why is my Mitel phone DDoSing strangers? Oh, it was roped into a new Mirai botnet
Source URL: https://www.theregister.com/2025/01/29/ddos_attacks_aquabot_mitel/ Source: The Register Title: Why is my Mitel phone DDoSing strangers? Oh, it was roped into a new Mirai botnet Feedly Summary: And now you won’t stop calling me, I’m kinda busy A new variant of the Mirai-based malware Aquabot is actively exploiting a vulnerability in Mitel phones to build a remote-controlled…
-
The Register: Baguette bandits strike again with ransomware and a side of mockery
Source URL: https://www.theregister.com/2025/01/28/baguettes_bandits_strike_again/ Source: The Register Title: Baguette bandits strike again with ransomware and a side of mockery Feedly Summary: Big-game hunting to the extreme Hellcat, the ransomware crew that infected Schneider Electric and demanded $125,000 in baguettes, has aggressively targeted government, education, energy, and other critical industries since it emerged around mid-2024.… AI Summary…
-
Hacker News: New Speculative Attacks on Apple CPUs
Source URL: https://predictors.fail/ Source: Hacker News Title: New Speculative Attacks on Apple CPUs Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses side-channel attacks, which exploit hardware-level vulnerabilities to extract sensitive information, highlighting the risks associated with shared CPU resources. This is particularly relevant for security professionals focused on hardware security and…