Tag: exploits

  • The Register: Hm, why are so many DrayTek routers stuck in a bootloop?

    Source URL: https://www.theregister.com/2025/03/25/draytek_routers_bootloop/ Source: The Register Title: Hm, why are so many DrayTek routers stuck in a bootloop? Feedly Summary: Time to update your firmware, if you can, to one with the security fixes, cough cough DrayTek router owners in the UK and beyond had a pretty miserable weekend after some ISPs began to notice…

  • Hacker News: RCE Vulnerabilities in K8s Ingress Nginx (9.8 CVE for ingress-Nginx)

    Source URL: https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities Source: Hacker News Title: RCE Vulnerabilities in K8s Ingress Nginx (9.8 CVE for ingress-Nginx) Feedly Summary: Comments AI Summary and Description: Yes ### Summary: The text outlines the discovery of significant vulnerabilities in the Ingress NGINX Controller for Kubernetes, known as IngressNightmare. These vulnerabilities, which allow unauthenticated Remote Code Execution (RCE), pose…

  • The Register: Oracle Cloud says it’s not true someone broke into its login servers and stole data

    Source URL: https://www.theregister.com/2025/03/23/oracle_cloud_customers_keys_credentials/ Source: The Register Title: Oracle Cloud says it’s not true someone broke into its login servers and stole data Feedly Summary: Despite evidence to the contrary as alleged pilfered info goes on sale Oracle has straight up denied claims by a miscreant that its public cloud offering has been compromised and information…

  • Hacker News: Next.js and the corrupt middleware: the authorizing artifact

    Source URL: https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware Source: Hacker News Title: Next.js and the corrupt middleware: the authorizing artifact Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses a critical security vulnerability discovered in Next.js, a widely used JavaScript framework, specifically regarding its middleware functionality. The vulnerability allows unauthorized access by manipulating request headers, which could…

  • Hacker News: Rocky Linux from CIQ – Hardened

    Source URL: https://ciq.com/products/rocky-linux/hardened Source: Hacker News Title: Rocky Linux from CIQ – Hardened Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses Rocky Linux from CIQ – Hardened, highlighting its optimizations for mission-critical environments with strict security requirements. It emphasizes advanced security features like memory corruption detection, kernel integrity checking, and robust…

  • Alerts: CISA Releases Five Industrial Control Systems Advisories

    Source URL: https://www.cisa.gov/news-events/alerts/2025/03/20/cisa-releases-five-industrial-control-systems-advisories Source: Alerts Title: CISA Releases Five Industrial Control Systems Advisories Feedly Summary: CISA released five Industrial Control Systems (ICS) advisories on March 20, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-079-01 Schneider Electric EcoStruxure™ ICSA-25-079-02 Schneider Electric Enerlin’X IFE and eIFE ICSA-25-079-03 Siemens Simcenter…

  • The Cloudflare Blog: Cloudflare for AI: supporting AI adoption at scale with a security-first approach

    Source URL: https://blog.cloudflare.com/cloudflare-for-ai-supporting-ai-adoption-at-scale-with-a-security-first-approach/ Source: The Cloudflare Blog Title: Cloudflare for AI: supporting AI adoption at scale with a security-first approach Feedly Summary: With Cloudflare for AI, developers, security teams and content creators can leverage Cloudflare’s network and portfolio of tools to secure, observe and make AI applications resilient and safe to use. AI Summary and…