Tag: zero-day

  • The Register: Akira ransomware crims abusing trifecta of SonicWall security holes for extortion attacks

    Source URL: https://www.theregister.com/2025/09/10/akira_ransomware_abusing_sonicwall/ Source: The Register Title: Akira ransomware crims abusing trifecta of SonicWall security holes for extortion attacks Feedly Summary: Patch, turn on MFA, and restrict access to trusted networks…or else Affiliates of the Akira ransomware gang are again exploiting a critical SonicWall vulnerability abused last summer, after a suspected zero-day flaw actually turned…

  • Krebs on Security: Microsoft Patch Tuesday, September 2025 Edition

    Source URL: https://krebsonsecurity.com/2025/09/microsoft-patch-tuesday-september-2025-edition/ Source: Krebs on Security Title: Microsoft Patch Tuesday, September 2025 Edition Feedly Summary: Microsoft Corp. today issued security updates to fix more than 80 vulnerabilities in its Windows operating systems and software. There are no known “zero-day" or actively exploited vulnerabilities in this month’s bundle from Redmond, which nevertheless includes patches for…

  • Slashdot: Boffins Build Automated Android Bug Hunting System

    Source URL: https://it.slashdot.org/story/25/09/05/196218/boffins-build-automated-android-bug-hunting-system?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Boffins Build Automated Android Bug Hunting System Feedly Summary: AI Summary and Description: Yes Summary: The text discusses an innovative AI-powered bug-hunting agent called A2, developed by researchers from Nanjing University and the University of Sydney. This agent aims to enhance vulnerability discovery in Android apps, achieving significantly higher…

  • The Register: Boffins build automated Android bug hunting system

    Source URL: https://www.theregister.com/2025/09/04/boffins_build_automated_android_bug_hunting/ Source: The Register Title: Boffins build automated Android bug hunting system Feedly Summary: AI agent system said to have found more than 100 zero-day flaws in production apps AI models get slammed for producing sloppy bug reports and burdening open source maintainers with hallucinated issues, but they also have the potential to…

  • Slashdot: Microsoft Reportedly Cuts China’s Early Access to Bug Disclosures, PoC Exploit Code

    Source URL: https://it.slashdot.org/story/25/08/22/2059255/microsoft-reportedly-cuts-chinas-early-access-to-bug-disclosures-poc-exploit-code Source: Slashdot Title: Microsoft Reportedly Cuts China’s Early Access to Bug Disclosures, PoC Exploit Code Feedly Summary: AI Summary and Description: Yes Summary: Microsoft has modified its Microsoft Active Protections Program (MAPP) to restrict access to proof-of-concept exploit code for companies in certain countries, including China, to combat the leak of sensitive…

  • The Register: Microsoft reportedly cuts China’s early access to bug disclosures, PoC exploit code

    Source URL: https://www.theregister.com/2025/08/21/microsoft_cuts_chinas_early_access/ Source: The Register Title: Microsoft reportedly cuts China’s early access to bug disclosures, PoC exploit code Feedly Summary: Better late than never after SharePoint assault? Microsoft has reportedly stopped giving Chinese companies proof-of-concept exploit code for soon-to-be-disclosed vulnerabilities following last month’s SharePoint zero-day attacks, which appear to be related to a leak…

  • The Register: Apple rushes out fix for active zero-day in iOS and macOS

    Source URL: https://www.theregister.com/2025/08/21/apple_imageio_exploit/ Source: The Register Title: Apple rushes out fix for active zero-day in iOS and macOS Feedly Summary: Another ‘extremely sophisticated’ exploit chewing at Cupertino’s walled garden Apple has shipped emergency updates to fix an actively exploited zero-day in its ImageIO framework, warning that the flaw has already been abused in targeted attacks.……

  • Microsoft Security Blog: Dissecting PipeMagic: Inside the architecture of a modular backdoor framework

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/08/18/dissecting-pipemagic-inside-the-architecture-of-a-modular-backdoor-framework/ Source: Microsoft Security Blog Title: Dissecting PipeMagic: Inside the architecture of a modular backdoor framework Feedly Summary: A comprehensive technical deep dive on PipeMagic, a highly modular backdoor used by Storm-2460 masquerading as a legitimate open-source ChatGPT Desktop Application. Beneath its disguise, PipeMagic is a sophisticated malware framework designed for flexibility and…