Author: Admin
A critical lack of Langflow that is added to the CISA KEV list against the background of permanent evidence
06 May 2025Red LakshmananCybersecurity / vulnerability A recently disclosed Critical Lack of Security that affects the Langflow platform with open source added to well -known exploited vulnerabilities (Ship) A catalog by the US Agency on Cybersecurity and Infrastructure (CISA), citing evidence of active operation. Vulnerability tracked as Cve-2025-3248It carries the CVSS 9.8 with a maximum of 10.0. “Langflow contains missing authentication vulnerability in/API/V1/Codid/Code Endpoint, which allows a remote, unauthorized attacker to perform an arbitrary code using the developed HTTP requests,” Cisa said. In particular, it was found that the final point is incorrectly caused by the built -in Python Exec…
05 May 2025Red LakshmananVulnerability / zero day Agency for cybersecurity and US infrastructure (CISA) has added The maximum lack of security affecting the Commvault command center to the famous operated vulnerability catalog (KEV) is just over a week after it has been publicly revealed. The vulnerability in question is Cve-2025-34028 (CVSS: 10.0), a traversal mistake affecting 11.38 innovative issue, from versions 11.38.0 to 11.38.19. It was considered in versions 11.38 and 11.38.25. “The Commvault Command Center contains a vulnerability of the path that allows a remote, unauthorized attacker to perform an arbitrary code,” Cisa – Note. The disadvantage essentially allows…
05 May 2025Red LakshmananNetwork security / vulnerability Cybersecurity researchers have revealed a number of safety vulnerabilities in the AirPlay protocol, which can be successfully used by the attacker to adopt sensitive devices that support their own wireless technology. Disadvantages were collectively named Air According to the Israeli Cybersecurity campaign Oligo. “These vulnerabilities can be attacked by attackers to potentially take control of the devices that support Airplay-including both Apple devices and other devices that use SDK Airplay,”-Uri Cat, Avi Lumensky and Gal Elbez – Note. Some vulnerabilities, such as CVE-2025-24252 and CVE-2025-24132, can be raised together to create another RCE…
The actors of the threat, known as the golden chickens, were attributed to two new families of malicious programs, called TerrasteAlerv2 and Terralogger, which implies constant development efforts to set up and diversify their arsenal. “TerraSteAlerv2 is designed to collect browser credentials, data wallet data and browser extension information,” Future Insikt Group records – Note. “On the contrary, the terralogger is a stand-upone. It uses a common low-level hook to record and record logs into local files.” Golden chickens, also known as Venom Spider notorious The family of malicious programs called More_eggs. It is known that it has been active…
03 May 2025Red LakshmananAttack of supply chain / malicious software Cybersecurity researchers have discovered three harmful Go Modules, which include embarrassed code to get a useful load to the next stage that can irrevitate the basic Linux disc and make it unsolvable. Package names are given below – GITHUB (.) Com/TRUEFULPHAM/Prototransform GitHub (.) Com/Blankloggia/Go-MCP GitHub (.) Com/Steelpoor/TLSPROXY ‘Although the legal appeared, these modules were held high clouded code Designed to obtain and execute distant useful loads “Research Package Kush Rada – Note. Packages are designed to check if the operating system they work on Linux, and if so, get a…
03 May 2025Red LakshmananMalicious software / operational technology The Iranian group funded by the state has been linked to a long-term cyber-break-up aimed at critical national infrastructure (CNI) in the Middle East, which lasted for almost two years. Activities, which lasted at least May 2023 to February 2025, entailed “wide espionage and suspected network affiliations – tactics that are often used to maintain constant access for future strategic superiority”, the Fortiguard incident team (FGIR) – Note In the report. The network security company noted that the attack demonstrates a covered trading apparatus with a famous Lemon sandstone (Previously Rubidium), which…
The US Department of Justice (DOJ) announced on Thursday an allegation of a 36-year-old national Yemen for allegedly deploying Black Kingdom ransom against global goals, including enterprises, schools and hospitals in the US. Rami Khaled Ahmed from Sana, Yemen, was charged with one conspiracy, one of their intentional damage to the protective computer and one of the data on the threat of damage to the secure computer. Ahmed is currently being rated in Yemen. “From March 2021 to June 2023, Ahmed and other infected computer networks of several victims in the US, including a medical company for billing services to…
02 May 2025Red LakshmananData Privacy / Social Media The Ireland Data Protection Commission (DPC) fined the popular Tiktok 530 million video exchange platform on Friday for violation of data protection rules in the region, transmitting data from European users to China. “Tiktok violated GDPR regarding the transfer of CES users (European economic zone) to China and transparency requirements,” DPC – Note In a statement. “The decision includes administrative fines totaling 530 million euros and an order that requires a scoring to transfer its processing within 6 months.” In addition, the order requires the company to suspend data transfer to China…
02 May 2025Hacker NewsOperations Vulneration / Security Operations In the Tines Library, run by the team on Workflow Orchestration and AI Tines Tines Publication of the community. A recent highlight is a workflow that automates CISA security recommendations and other suppliers, enriches consultations with Crowdstrike Persondation Intelligence, and streamlines tickets and notifications. Designed by Josh McLaflin, LivePerson security engineers, the workflow dramatically reduces manual work, keeping analysts that control the final solutions, helping the teams to stay on top of new vulnerabilities. “Before automation, the creation of tickets for 45 vulnerabilities took about 150 minutes of work,” Josh explains. “After…
02 May 2025Red LakshmananCriminal software / intelligence threats Loader malicious programs known as A coin loader was used to deliver Trojan remote -based pawershel under the name Ghostwaver. “MINSLOAADER runs through a multi -metal infection network that includes in – Note In a report that shared with Hacker News. “The malicious programs use methods of evading sandbox and virtual machine, domain generation algorithm (DGA) and HTTP Command-Control (C2). Phishing and Drive-by Download Companies Distributed A coin loader were discovered in the wild since the beginning of 2023, per Cyberdefense Orange. The loader is observed to provide various subsequent useful loads…