Tag: vulnerability assessments
-
The Register: Cybercrims claim raid on 28,000 Red Hat repos, say they have sensitive customer files
Source URL: https://www.theregister.com/2025/10/02/cybercrims_claim_raid_on_28000/ Source: The Register Title: Cybercrims claim raid on 28,000 Red Hat repos, say they have sensitive customer files Feedly Summary: 570GB of data claimed to be stolen by the Crimson Collective A hacking crew claims to have broken into Red Hat’s private GitHub repositories, exfiltrating some 570GB of compressed data, including sensitive…
-
Unit 42: TOTOLINK X6000R: Three New Vulnerabilities Uncovered
Source URL: https://unit42.paloaltonetworks.com/totolink-x6000r-vulnerabilities/ Source: Unit 42 Title: TOTOLINK X6000R: Three New Vulnerabilities Uncovered Feedly Summary: Researchers identified vulnerabilities in TOTOLINK X6000R routers: CVE-2025-52905, CVE-2025-52906 and CVE-2025-52907. We discuss root cause and impact. The post TOTOLINK X6000R: Three New Vulnerabilities Uncovered appeared first on Unit 42. AI Summary and Description: Yes Summary: The text highlights newly…
-
The Register: More packages poisoned in npm attack, but would-be crypto thieves left pocket change
Source URL: https://www.theregister.com/2025/09/09/npm_supply_chain_attack/ Source: The Register Title: More packages poisoned in npm attack, but would-be crypto thieves left pocket change Feedly Summary: Miscreants cost victims time rather than money During the two-hour window on Monday in which hijacked npm versions were available for download, malware-laced packages reached one in 10 cloud environments, according to Wiz…
-
Slashdot: Perplexity’s AI Browser Comet Vulnerable To Prompt Injection Attacks That Hijack User Accounts
Source URL: https://it.slashdot.org/story/25/08/25/1654220/perplexitys-ai-browser-comet-vulnerable-to-prompt-injection-attacks-that-hijack-user-accounts?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Perplexity’s AI Browser Comet Vulnerable To Prompt Injection Attacks That Hijack User Accounts Feedly Summary: AI Summary and Description: Yes Summary: The text highlights significant vulnerabilities in Perplexity’s Comet browser linked to its AI summarization functionalities. These vulnerabilities allow attackers to hijack user accounts and execute malicious commands, posing…
-
The Register: FBI: Russian spies exploiting a 7-year-old Cisco bug to slurp configs from critical infrastructure
Source URL: https://www.theregister.com/2025/08/20/russian_fsb_cyberspies_exploiting_cisco_bug/ Source: The Register Title: FBI: Russian spies exploiting a 7-year-old Cisco bug to slurp configs from critical infrastructure Feedly Summary: Snarfing up config files for ‘thousands’ of devices…just for giggles, we’re sure The FBI and security researchers today warned that Russian government spies exploited a seven-year-old bug in end-of-life Cisco networking devices…