Tag: vulnerability
-
Krebs on Security: Microsoft: Happy 2025. Here’s 161 Security Updates
Source URL: https://krebsonsecurity.com/2025/01/microsoft-happy-2025-heres-161-security-updates/ Source: Krebs on Security Title: Microsoft: Happy 2025. Here’s 161 Security Updates Feedly Summary: Microsoft today unleashed updates to plug a whopping 161 security vulnerabilities in Windows and related software, including three “zero-day" weaknesses that are already under active attack. Redmond’s inaugural Patch Tuesday of 2025 bundles more fixes than the company…
-
Alerts: CISA Adds Two Known Exploited Vulnerabilities to Catalog
Source URL: https://www.cisa.gov/news-events/alerts/2025/01/13/cisa-adds-two-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Two Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-12686 BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) OS Command Injection Vulnerability CVE-2024-48365 Qlik Sense HTTP Tunneling Vulnerability These types of vulnerabilities…
-
The Register: Snyk appears to deploy ‘malicious’ packages targeting Cursor for unknown reason
Source URL: https://www.theregister.com/2025/01/14/snyk_npm_deployment_removed/ Source: The Register Title: Snyk appears to deploy ‘malicious’ packages targeting Cursor for unknown reason Feedly Summary: Packages removed, vendor said to have apologized to AI code editor as onlookers say it could have been a test Developer security company Snyk is at the center of allegations concerning the possible targeting or…
-
Anchore: Software Supply Chain Security in 2025: SBOMs Take Center Stage
Source URL: https://anchore.com/blog/software-supply-chain-security-in-2025-sboms-take-center-stage/ Source: Anchore Title: Software Supply Chain Security in 2025: SBOMs Take Center Stage Feedly Summary: In recent years, we’ve witnessed software supply chain security transition from a quiet corner of cybersecurity into a primary battlefield. This is due to the increasing complexity of modern software that obscures the full truth—applications are a…
-
The Register: Miscreants ‘mass exploited’ Fortinet firewalls, ‘highly probable’ zero-day used
Source URL: https://www.theregister.com/2025/01/14/miscreants_mass_exploited_fortinet_firewalls/ Source: The Register Title: Miscreants ‘mass exploited’ Fortinet firewalls, ‘highly probable’ zero-day used Feedly Summary: Ransomware ‘not off the table,’ Arctic Wolf threat hunter tells El Reg Miscreants running a “mass exploitation campaign" against Fortinet firewalls, which peaked in December, may be using an unpatched zero-day vulnerability to compromise the equipment, according…