Author: Admin
May 14, 2025Red LakshmananVulnerability / safety of the final points Iuti is liberated Safety updates to solve two deficiencies in the Endpoint Manager Mabil (EPMM) software that was assembled in the attack to get deleted code. The vulnerabilities in question are below – Cve-2025-4427 (CVSS Assessment: 5.3) – Authy Authentication in Mobile Endpoint Manager Ivanti allows attackers to access protected resources without proper powers Cve-2025-4428 (CVSS assessment: 7.2) – Vulnerability of the remote code under IVANnti Endpoint Manager Mobile allows the attackers to perform an arbitrary code in the target system Disadvantages affect the following versions of the product -…
May 14, 2025Red LakshmananVulnerability / safety network Fortinet has secured a critical lack of security, which, he said, was used as a zero day in attacks focused on the telephone systems of Fortivoice Enterprise. The vulnerability, which is monitored as the CVE-2025-32756, carries the CVSS 9.6 out of 10.0. “The vulnerability of overflow based on the stack (CWE-121) in Fortivoice, FortIMail, Fortindr, Fortirecorder and Forticamera can allow a remote unauthorized attacker to perform an arbitrary code or team using the HTTP”, “Company – Note In advisory. The company said it noticed the shortage that is operated in the Wild on…
May 13, 2025Red LakshmananAttack of the supply chain / blockchain Cybersecurity researchers have discovered a malicious package on Python Package Index (PYPI), which is supposed to be a supplement associated with Blockchain Solana, but contains malicious functionality for the steal code and developers’ secrets. A package called Solana-Token is more unavailable to download with Pypi but not before it was Loaded 761 times. It was first published to Pypi in early April 2024, albeit with a completely different version of the version. “When installing the malicious package tries to highlight the source code and the secrets of the developer developer…
China associated with China, exploit SAP Cve-2025-31324 to break 581 critical systems worldwide
May 13, 2025Red LakshmananVulnerability / intelligence threats Recently revealed a critical security lack of affecting SAP Netwaver, used by several Nation-Nation-State subjects to focus on important infrastructure networks. “Actors used Cve-2025-31324. – Note in an analysis published today. The goals of the company include natural gas distribution networks, water and integrated utilities for waste management in the United Kingdom, production of oil and gas companies and industrial companies in the US, as well as government ministries in Saudi Arabia responsible for investment strategy and financial regulation. The conclusions are based on an openly open catalog detected on the controlled attacker’s…
The actor associated with North Korea, known as the Konni APT, was associated with a phishing company aimed at government agencies in Ukraine, which testifies to the actor’s actor Targeting the frame of Russia. Enterprise ProfofPoint security company said the company’s ultimate goal is to collect intelligence over the “Russian invasion trajectory”. “The group’s interest in Ukraine follows – Note In a report that shared with Hacker News. Konni Aptalso known as heating dreams, osmium, ta406, and KnowledgeIt is a group of cyber -scalp, which has a history of orientation on the organization of South Korea, the USA and Russia.…
May 13, 2025Hacker NewsAI Security / Zero Trust The cybersecurity landscape was sharply rebuilt into the appearance of generative II. Now the attackers use large language models (LLMS) to bring themselves for reliable people and automate these social engineering tactics on scale. Let’s look at the status of these ascending attacks, which fueled them and how to actually prevent, not reveal them. The most powerful person on the call may not be valid Recent exploration reports emphasize the increasing sophistication and prevalence of AI-AI attacks: In this new era, trust cannot be accepted or simply expressed. This should be proven…
May 13, 2025Red LakshmananCyberCrime / Ransomware Moldovan law enforcement agencies arrested a 45-year-old foreign man suspected of participating in a series of attacks on ransom aimed at Dutch companies in 2021. “He’s Abum – Note In a statement on Monday. In conjunction with arrest, police seized more than 84,000 euros ($ 93,000) cash, electronic wallet, two laptops, a mobile phone, a tablet, six bank cards, two storage devices and six memory cards. The name of the suspect was not disclosed. But he said he was detained after a search at his residence in Moldova. At least in one case the…
Türkiye Hackers operate the Messenger Zero-Day withdrawal to give up Golang Backdoors on Kurdish servers
May 13, 2025Red LakshmananZero day / vulnerability The Türkiye threat actor exploits the lack of security with zero day on the Indian communication platform called “Messenger withdrawal” as part of a cyber-spanning campaign since April 2024. “These exploits have led to the collection of relevant users’ data for goals in Iraq,” Microsoft’s intelligence group – Note. “The targets of the attack are related to the Kurdish military personnel operating in Iraq, according to previously observed marble priorities aimed at dust.” Activities has been associated with a group of threats it monitors as Marble dust (Previously silicon), which is also known…
May 12, 2025.Red LakshmananVulnerability / safety of the final points ASUS released updates to address two security deficiencies that affect the ASUS DriverHub, which, if successfully used, can allow the attacker to use the software to achieve the remote execution of the code. Driver This is a tool designed to automatically detect a computer’s maternity board model and displaying the necessary drivers updates for subsequent installation by communication with A with A with A A highlighted site Located in “DriverHub.Asus (.) Com.” Disadvantages found in the software given below – Cve-2025-3462 (CVSS Assessment: 8.4) – Vulnerability of Error Verification, which…
The detection of the tinted powers is only half the battle. A real problem – and often neglected half of the equation is what happens after detection. New Studies from the state Mysteries Hitgardan spread 2025. The report shows an alarming trend: the vast majority of exposed campaign The secrets expressed in the state shelters remain real years after the detection, creating an extended surface of the attack that many organizations do not solve. According to the GitGuardian analysis for open secrets in GitHub repository, an alarming percentage of powers found in 2022 remains true today: “Detection of a secret…