Cybersecurity

Last update (UTC): 22:45 - 14/10/2025

Security.nl

Website RIVM weer online na verhelpen van kwetsbaarheid in webformulier

16:30 - 14/10/2025
  View item as page
De website van het Rijksinstituut voor Volksgezondheid en Milieu (RIVM) is weer online nadat die eerder vandaag offline werd ...

https://www.security.nl/posting/909151/Website+RIVM+weer+online+na+verhelpen+van


Firefox Password Manager slaat wachtwoorden voortaan versleuteld op via AES

15:30 - 14/10/2025
  View item as page
De in Firefox ingebouwde Password Manager slaat wachtwoorden voortaan versleuteld op via AES-encryptie, zo heeft Mozilla ...

https://www.security.nl/posting/909141/Firefox+Password+Manager+slaat+wachtwoord


TeamViewer: veertig procent computers draait nog op Windows 10

15:07 - 14/10/2025
  View item as page
Meer dan veertig procent van de computers wereldwijd draait nog op Windows 10, zo stelt TeamViewer op basis van eigen onderzoek ...

https://www.security.nl/posting/909136/TeamViewer%3A+veertig+procent+computers+d


Pixnapping-aanval laat malafide app 2FA-codes van Androidtelefoons stelen

14:34 - 14/10/2025
  View item as page
Onderzoekers hebben een nieuwe aanval gedemonstreerd waarmee het mogelijk is voor malafide apps om 2FA-codes en andere ...

https://www.security.nl/posting/909132/Pixnapping-aanval+laat+malafide+app+2FA-c


RIVM haalt website offline nadat er malafide berichten op verschenen

13:51 - 14/10/2025
  View item as page
Het Rijksinstituut voor Volksgezondheid en Milieu (RIVM) heeft de eigen website offline gehaald nadat er malafide berichten op ...

https://www.security.nl/posting/909118/RIVM+haalt+website+offline+nadat+er+malaf


Defecte software-update laat Jeeps langs kant van de weg stranden

12:12 - 14/10/2025
  View item as page
Een defecte software-update heeft er afgelopen vrijdag in de Verenigde Staten voor gezorgd dat allerlei Jeeps langs de kant van ...

https://www.security.nl/posting/909092/Defecte+software-update+laat+Jeeps+langs+


Australische overheid roept bedrijven op om legacy IT te vervangen

11:33 - 14/10/2025
  View item as page
Op de dag dat Microsoft de ondersteuning van Windows 10 stopt roept de Australische overheid bedrijven op om legacy IT te ...

https://www.security.nl/posting/909081/Australische+overheid+roept+bedrijven+op+


Aanstelling van Meta-lobbyist als commissaris Ierse privacytoezichthouder baart zorgen

10:58 - 14/10/2025
  View item as page
Tientallen burgerrechtenbewegingen en maatschappelijke organisaties hebben in een open brief aan de Europese Commissie hun ...

https://www.security.nl/posting/909076/Aanstelling+van+Meta-lobbyist+als+commiss


Kringloopwinkels Friese afvalverwerker Omrin dicht wegens ransomware

10:21 - 14/10/2025
  View item as page
De Friese afvalverwerker Omrin is gisteren getroffen door een ransomware-aanval, wat gevolgen heeft voor de dienstverlening. Zo ...

https://www.security.nl/posting/909069/Kringloopwinkels+Friese+afvalverwerker+Om


Britse overheid meldt recordaantal cyberaanvallen met nationale impact

09:59 - 14/10/2025
  View item as page
Het Verenigd Koninkrijk heeft de afgelopen twaalf maanden met een recordaantal cyberaanvallen te maken gekregen die nationale ...

https://www.security.nl/posting/909064/Britse+overheid+meldt+recordaantal+cybera


Slashdot

Windows 10 Support 'Ends' Today

00:00 - 14/10/2025
  View item as page
An anonymous reader quotes a report from Ars Technica: Today is the official end-of-support date for Microsoft's Windows 10. That doesn't mean these PCs will suddenly stop working, but if you don't take action, it does mean your PC has received its last regular security patches and that Microsoft is washing its hands of technical support. This end-of-support date comes about a decade after the initial release of Windows 10, which is typical for most Windows versions. But it comes just four years after Windows 10 was replaced by Windows 11, a version with stricter system requirements that left many older-but-still-functional PCs with no officially supported upgrade path. As a result, Windows 10 still runs on roughly 40 percent of the world's Windows PCs (or around a third of US-based PCs), according to StatCounter data. But this end-of-support date also isn't set in stone. Home users with Windows 10 PCs can enroll in Microsoft's Extended Security Updates (ESU) program, which extends the support timeline by another year. [...] Home users can only get a one-year stay of execution for Windows 10, but IT administrators and other institutions with fleets of Windows 10 PCs can also pay for up to three years of ESUs, which is also roughly the amount of time users can expect new Microsoft Defender antivirus updates and updates for core apps like Microsoft Edge. Obviously, Microsoft's preferred upgrade path would be either an upgrade to Windows 11 for PCs that meet the requirements or an upgrade to a new PC that does support Windows 11. It's also still possible, at least for now, to install and run Windows 11 on unsupported PCs. Your day-to-day experience will generally be pretty good, though installing Microsoft's major yearly updates (like the upcoming Windows 11 25H2 update) can be a bit of a pain.

Read more of this story at Slashdot.

https://tech.slashdot.org/story/25/10/14/2043238/windows-10-support-ends-today?u


Salesforce Says AI Customer Service Saves $100 Million Annually

00:00 - 14/10/2025
  View item as page
Salesforce says it's saving about $100 million a year by using AI tools in the software company's customer service operations. From a report: The company is working to sell AI features that can handle work such as customer service or early-stage sales. To illustrate the value of the Agentforce product to business clients, Salesforce has been vocal about its own use of the technology. Chief Executive Officer Marc Benioff announced the statistic on Salesforce's savings during a speech Tuesday at the annual Dreamforce conference in San Francisco. The company said more than 12,000 customers are using Agentforce. For example, Reddit was able to cut customer support resolution time by 84%, Salesforce said.

Read more of this story at Slashdot.

https://slashdot.org/story/25/10/14/1925230/salesforce-says-ai-customer-service-


DirecTV Will Soon Bring AI Ads To Your Screensaver

00:00 - 14/10/2025
  View item as page
DirecTV wants to use AI to put you, your family, and your pets inside a custom TV screensaver. From a report: If that's not uncanny enough, you'll find items you can shop for within that AI environment, whether it's a piece of clothing similar to the one your AI likeness is wearing or a piece of furniture that pops up alongside it. The satellite TV giant is partnering with the AI company Glance to roll out this experience to DirecTV Gemini devices starting next year. "We are making television a lean-in experience versus lean back," Rajat Wanchoo, the group vice president of commercial partnerships at Glance, tells The Verge. "We want to give users a chance to use the advancements that have happened in generative AI to create a ChatGPT moment for themselves, but on TV." Glance is owned by InMobi, the same company that injected ecommerce bloatware into Motorola's budget phones.

Read more of this story at Slashdot.

https://entertainment.slashdot.org/story/25/10/14/1323222/directv-will-soon-brin


Lawyer Caught Using AI While Explaining to Court Why He Used AI

00:00 - 14/10/2025
  View item as page
An anonymous reader shares a report: An attorney in a New York Supreme Court commercial case got caught using AI in his filings, and then got caught using AI again in the brief where he had to explain why he used AI, according to court documents filed earlier this month. New York Supreme Court Judge Joel Cohen wrote in a decision granting the plaintiff's attorneys' request for sanctions that the defendant's counsel, Michael Fourte's law offices, not only submitted AI-hallucinated citations and quotations in the summary judgment brief that led to the filing of the plaintiff's motion for sanctions, but also included "multiple new AI-hallucinated citations and quotations" in the process of opposing the motion. "In other words," the judge wrote, "counsel relied upon unvetted AI -- in his telling, via inadequately supervised colleagues -- to defend his use of unvetted AI." The case itself centers on a dispute between family members and a defaulted loan. The details of the case involve a fairly run-of-the-mill domestic money beef, but Fourte's office allegedly using AI that generated fake citations, and then inserting nonexistent citations into the opposition brief, has become the bigger story.

Read more of this story at Slashdot.

https://yro.slashdot.org/story/25/10/14/1542245/lawyer-caught-using-ai-while-exp


Indonesia's Film Industry Embraces AI To Make Hollywood-style Movies For Cheap

00:00 - 14/10/2025
  View item as page
Indonesia's film industry has started using generative AI tools to produce films at a fraction of Hollywood budgets. The country's filmmakers are deploying ChatGPT for scriptwriting, Midjourney for image generation, and Runway for video storyboarding. VFX artist Amilio Garcia Leonard told Rest of World that AI has reduced his draft editing time by 70%. The Indonesian Film Producer Association supports the technology. Indonesian films typically cost 10 billion rupiah ($602,500), less than 1% of major Hollywood productions. The sector employed about 40,000 people in 2020 and generated over $400 million in box office sales in 2023. Jobs for storyboarders, VFX artists, and voice actors are disappearing.

Read more of this story at Slashdot.

https://entertainment.slashdot.org/story/25/10/14/1536226/indonesias-film-indust


The World is Producing More Food Crops Than Ever Before

00:00 - 14/10/2025
  View item as page
The United Nations Food and Agriculture Organization projects record production of global cereal crops in the 2025-26 farming season. The forecast covers wheat, corn and rice, and comes as the global stocks-to-use ratio stands around 30.6% -- the world is producing nearly a third more of these foundational crops than it currently uses. The U.S. Department of Agriculture reported in August that American farmers would harvest a record corn crop at record yield per acre. The FAO Food Price Index has risen slightly this year but remains nearly 20% below its peak during the early months of the war in Ukraine. Average calories available per person worldwide have climbed from roughly 2,100 to 2,200 kilocalories daily in the early nineteen-sixties to just under 3,000 kilocalories daily by 2022. Cereal yields have roughly tripled since 1961. Yet the World Bank estimates around 2.6 billion people cannot afford a healthy diet, and current famines in Gaza and Sudan stem from political failures rather than crop failures.

Read more of this story at Slashdot.

https://news.slashdot.org/story/25/10/14/1525220/the-world-is-producing-more-foo


Generative AI Systems Miss Vast Bodies of Human Knowledge, Study Finds

00:00 - 14/10/2025
  View item as page
Generative AI models trained on internet data lack exposure to vast domains of human knowledge that remain undigitized or underrepresented online. English dominates Common Crawl with 44% of content. Hindi accounts for 0.2% of the data despite being spoken by 7.5% of the global population. Tamil represents 0.04% despite 86 million speakers worldwide. Approximately 97% of the world's languages are classified as "low-resource" in computing. A 2020 study found 88% of languages face such severe neglect in AI technologies that bringing them up to speed would require herculean efforts. Research on medicinal plants in North America, northwest Amazonia and New Guinea found more than 75% of 12,495 distinct uses of plant species were unique to just one local language. Large language models amplify dominant patterns through what researchers call "mode amplification." The phenomenon narrows the scope of accessible knowledge as AI-generated content increasingly fills the internet and becomes training data for subsequent models.

Read more of this story at Slashdot.

https://slashdot.org/story/25/10/14/155258/generative-ai-systems-miss-vast-bodie


California Cracks Down on 'Predatory' Early Cancellation Fees

00:00 - 14/10/2025
  View item as page
California has enacted new legislation that aims to limit companies from charging consumers "exorbitant" fees to cancel fixed-term contracts. From a report: Assembly Bill 483 was signed into law by California Gov. Gavin Newsom on Friday, placing transparency requirements and fee limits on early terminations for installment contracts -- plans that allow consumers to make recurring payments for goods and services over a specified duration. This includes services that lure consumers into signing annual contracts by allowing them to pay in installments that appear similar to rolling monthly subscriptions, but with hefty cancellation fees for not locking in for the full year. The bill bans companies from hiding early termination fee disclosures within fine print or obscured hyperlinks, and limits the total fee amount to a maximum of 30 percent of the total contract cost. The goal is to make it easier for Californians to take these fees into account when comparing between services, and lessen the financial burden if they need to end their contract early.

Read more of this story at Slashdot.

https://slashdot.org/story/25/10/14/176237/california-cracks-down-on-predatory-e


Satellites Are Leaking the World's Secrets: Calls, Texts, Military and Corporate Data

00:00 - 14/10/2025
  View item as page
Researchers at UC San Diego and the University of Maryland have found that roughly half of geostationary satellite signals transmit sensitive data without encryption. The team spent three years using an $800 satellite receiver on a university rooftop in San Diego to intercept communications from satellites visible from their location. They collected phone calls and text messages from more than 2,700 T-Mobile users in just nine hours of recording. The researchers also obtained data from airline passengers using in-flight Wi-Fi, communications from electric utilities and offshore oil and gas platforms, and US and Mexican military communications that revealed personnel locations and equipment details. The exposed data resulted from telecommunications companies using satellites to relay signals from remote cell towers to their core networks. The researchers examined only about 15% of global satellite transponder communications and presented their findings at an Association for Computing Machinery conference in Taiwan this week. Most companies warned by the researchers have encrypted their satellite transmissions, but some US critical infrastructure owners have not yet added encryption.

Read more of this story at Slashdot.

https://science.slashdot.org/story/25/10/14/1043236/satellites-are-leaking-the-w


Beijing Issues Documents Without Word Format Amid US Tensions

00:00 - 14/10/2025
  View item as page
An anonymous reader shares a report: China's expansion of its rare earth export controls appeared to mark another escalation in the US-China trade war last week. But the announcements were also significant in another way: unusually, the documents could not be opened using American word processing software. For the first time, China's Ministry of Commerce issued a slew of documents that could be directly accessed only through WPS Office -- China's answer to Microsoft Office -- as Beijing continues its tech self-reliance drive. Developed by the Beijing-based software company Kingsoft, WPS Office uses a different coding structure to Microsoft Office, meaning WPS text files cannot be opened directly in Word without conversion. Previously, the ministry primarily released text documents in Microsoft Word format.

Read more of this story at Slashdot.

https://it.slashdot.org/story/25/10/14/0920224/beijing-issues-documents-without-


theregister.com/security

Asahi breach leaves bitter taste as brewer fears personal data slurped

14:12 - 14/10/2025
  View item as page
Japan's beer behemoth still mopping up after ransomware spill that disrupted deliveries and delayed results

Asahi's cyber hangover just got worse, with the brewer now admitting that personal information may have been tapped in last month's attack....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/asahi_breach_upda


Mozilla is recruiting beta testers for a free, baked-in Firefox VPN

13:28 - 14/10/2025
  View item as page
Lucky few randomly selected to trial the feature, which won't fully roll out for several months

Mozilla is working on a built-in VPN for Firefox, with beta tests opening to select users shortly....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/mozilla_firefox_v


Oracle rushes out another emergency E-Business Suite patch as Clop fallout widens

12:32 - 14/10/2025
  View item as page
Latest in a long line of EBS flaws leta miscreants remotely compromise enterprise systems to pinch sensitive data

Oracle is rushing out another emergency patch for its embattled E-Business Suite as the fallout from the Clop-linked attacks continues to spread....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/oracle_rushes_out


British govt agents demand action after UK mega-cyberattacks surge 50%

10:51 - 14/10/2025
  View item as page
Warn businesses to act now as high-severity incidents keep climbing

Cyberattacks that meet upper severity thresholds set by the UK government's cyber agents have risen 50 percent in the last year, despite almost zero change in the volume of cases handled....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/ncsc_uk_cyberatta


EU biometric border system launch hits inevitable teething problems

06:45 - 14/10/2025
  View item as page
Malfunctioning equipment and manual processing cause 90-minute waits

The European Union's new biometric Exit/Entry System (EES) got off to a chaotic start at Prague's international airport, with travelers facing lengthy queues and malfunctioning equipment forcing border staff to process arrivals manually....

https://go.theregister.com/feed/www.theregister.com/2025/10/14/eu_biometric_bord


Scattered Lapsus$ Hunters rage-quit the internet (again), promise to return next year

16:17 - 13/10/2025
  View item as page
'We will never stop,' say crooks, despite retiring twice in the space of a month

The Scattered Lapsus$ Hunters (SLSH) cybercrime collective - compriseed primarily of teenagers and twenty-somethings - announced it will go dark until 2026 following the FBI's seizure of its clearweb site....

https://go.theregister.com/feed/www.theregister.com/2025/10/13/scattered_lapsus_


Microsoft 'illegally' tracked students via 365 Education, says data watchdog

13:38 - 13/10/2025
  View item as page
Redmond argued schools, education authorities are responsible for GDPR

An Austrian digital privacy group has claimed victory over Microsoft after the country's data protection regulator ruled the software giant "illegally" tracked students via its 365 Education platform and used their data....

https://go.theregister.com/feed/www.theregister.com/2025/10/13/microsoft_365_edu


China probes Qualcomm's Autotalks deal amid rising US trade tensions

12:21 - 13/10/2025
  View item as page
Beijing insists it's business as usual – Washington might see it differently

China's competition regulator has launched an investigation into Qualcomm's purchase of Israeli firm Autotalks, the latest salvo in the escalating tech trade war between Washington and Beijing....

https://go.theregister.com/feed/www.theregister.com/2025/10/13/qualcomm_autotalk


Ofcom fines 4chan £20K and counting for pretending UK's Online Safety Act doesn't exist

11:10 - 13/10/2025
  View item as page
Regulator warns penalties will pile up until internet toilet does its paperwork

Ofcom, the UK's Online Safety Act regulator, has fined online message board 4chan £20,000 ($26,680) for failing to protect children from harmful content....

https://go.theregister.com/feed/www.theregister.com/2025/10/13/4chan_ofcom_fine/


Dutch government puts Nexperia on a short leash over chip security fears

11:01 - 13/10/2025
  View item as page
Minister invokes powers to stop firm shifting knowledge to China, citing governance shortcomings

The Dutch government has placed Nexperia - a Chinese-owned semiconductor company that previously operated Britain's Newport Wafer Fab — under special administrative measures, citing serious governance failures that threaten European tech security....

https://go.theregister.com/feed/www.theregister.com/2025/10/13/nexperia_special_


CISO2CISO.com

Thinking About Becoming a Licensed Engineer? Start Here.

14:04 - 13/09/2025
  View item as page

NCEES explains why licensure matters for engineers and answers your top questions about the FE and PE exams. Source Views: 6

La entrada Thinking About Becoming a Licensed Engineer? Start Here. se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/thinking-about-becoming-a-licensed-engineer-start-here/


Celebrate Hispanic Heritage Month With SWE

14:04 - 13/09/2025
  View item as page

View our compilation of online stories and resources highlighting the Hispanic community and their contributions to STEM. Source Views: 4

La entrada Celebrate Hispanic Heritage Month With SWE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/celebrate-hispanic-heritage-month-with-swe/


Weekly Update 469 – Source: www.troyhunt.com

13:04 - 13/09/2025
  View item as page

Source: www.troyhunt.com – Author: Troy Hunt Sponsored by: So I had this idea around training a text-to-speech engine with my voice, then using that to speak over the Sonos at home to announce AI-driven events, such as people ringing the doorbell. A few hours’ worth of video from these weekly updates fed into ElevenLabs and […]

La entrada Weekly Update 469 – Source: www.troyhunt.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/weekly-update-469-source-www-troyhunt-com/


FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks – Source:thehackernews.com

12:04 - 13/09/2025
  View item as page

Source: thehackernews.com – Author: . The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to release indicators of compromise (IoCs) associated with two cybercriminal groups tracked as UNC6040 and UNC6395 for a string of data theft and extortion attacks. “Both groups have recently been observed targeting organizations’ Salesforce platforms via different initial […]

La entrada FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/fbi-warns-of-unc6040-and-unc6395-targeting-salesforce-plat


The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com

10:04 - 13/09/2025
  View item as page

Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool […]

La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/the-critical-role-of-sboms-software-bill-of-materials-in-d


Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com

10:04 - 13/09/2025
  View item as page

Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s […]

La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/ransomware-tactics-are-shifting-heres-how-to-keep-up-sourc


French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com

07:04 - 13/09/2025
  View item as page

Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 4

La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/french-advisory-sheds-light-on-apple-spyware-activity-sour


Without Federal Help, Cyber Defense Is Up to the Rest of Us – Source: www.darkreading.com

07:04 - 13/09/2025
  View item as page

Source: www.darkreading.com – Author: Riaz Lakhani Together, we can foster a culture of collaboration and vigilance, ensuring that we are not just waiting for a hero to save us, but actively working to protect ourselves and our communities. Original Post URL: https://www.darkreading.com/cyberattacks-data-breaches/without-federal-help-cyber-defense-cisa Category & Tags: – Views: 6

La entrada Without Federal Help, Cyber Defense Is Up to the Rest of Us – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/without-federal-help-cyber-defense-is-up-to-the-rest-of-us


Safer Conversational AI for Cybersecurity: The BIX Approach – Source: securityboulevard.com

06:04 - 13/09/2025
  View item as page

Source: securityboulevard.com – Author: Gaurav Banga Here’s a scenario security teams increasingly face. A user—or an attacker pretending to be one—types something like: This is how many prompt injection attempts begin. The phrase looks harmless, but it’s a red flag: the user is telling the AI to forget its built‐in rules. What follows is often […]

La entrada Safer Conversational AI for Cybersecurity: The BIX Approach – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/safer-conversational-ai-for-cybersecurity-the-bix-approach


Operation Eastwood: Measuring the Real Impact on NoName057(16) – Source: securityboulevard.com

06:04 - 13/09/2025
  View item as page

Source: securityboulevard.com – Author: Sofia Naer Introduction On July 16, 2025, Europol revealed the details of Operation Eastwood, a coordinated international strike against one of the most active pro-Russian cybercrime groups, NoName057(016). The announcement promised a major disruption to the group’s activities. In this blog, we explore whether Operation Eastwood had any real impact on […]

La entrada Operation Eastwood: Measuring the Real Impact on NoName057(16) – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

https://ciso2ciso.com/operation-eastwood-measuring-the-real-impact-on-noname0571


Hackread.com

Microsoft Limits IE Mode in Edge After Chakra Zero-Day Activity Detected

14:03 - 14/10/2025
  View item as page
Microsoft restricted access to Edge's IE Mode in August 2025 after hackers used a Chakra zero-day flaw to bypass security and take over user devices. Check out the new steps for enabling IE Mode.

https://hackread.com/microsoft-limits-ie-mode-edge-chakra-zero-day/




From Prompts to Protocols: How Agentic Systems, MCP, Vibe Coding, and Schema-Aware Tools Are Rewiring Software Engineering

12:52 - 14/10/2025
  View item as page
Modern software engineering faces growing complexity across codebases, environments, and workflows. Traditional tools, although effective, rely heavily on…

https://hackread.com/agentic-systems-mcp-vibe-coding-schema-software-engineering


Police Bust GXC Team, One of the Most Active Cybercrime Networks

12:20 - 14/10/2025
  View item as page
Spanish Guardia Civil and Group-IB arrest 'GoogleXcoder,' the 25-year-old Brazilian mastermind of the GXC Team, for selling AI-powered phishing kits and malware used to steal millions from banks across the US, UK, Spain, and Brazil.

https://hackread.com/police-bust-gxc-team-cybercrime-networks/


How Top SOCs Stay Up-to-Date on Current Threat Landscape

10:44 - 14/10/2025
  View item as page
Disclosure: This article was provided by ANY.RUN. The information and analysis presented are based on their research and findings.

https://hackread.com/how-top-socs-up-to-date-current-threat-landscape/


Astaroth Trojan Uses GitHub Images to Stay Active After Takedowns

09:54 - 14/10/2025
  View item as page
Astaroth banking trojan has evolved to use GitHub and steganography for resilient C2, hiding its vital commands in images. Learn how this sophisticated malware employs fileless techniques to steal banking and crypto credentials from users across Latin America.

https://hackread.com/astaroth-trojan-github-images-active-takedowns/



ShinyHunters Leak Data from Qantas, Vietnam Airlines and Other Major Firms

17:04 - 13/10/2025
  View item as page
ShinyHunters and its affiliate hackers have leaked data from 6 firms, including Qantas and Vietnam Airlines, after claiming to breach 39 companies via a Salesforce vulnerability.

https://hackread.com/shinyhunters-leak-data-qantas-vietnam-airlines-others/


OpenAI’s Guardrails Can Be Bypassed by Simple Prompt Injection Attack

15:15 - 13/10/2025
  View item as page
Just weeks after its release, OpenAI’s Guardrails system was quickly bypassed by researchers. Read how simple prompt injection attacks fooled the system’s AI judges and exposed an ongoing security concern for OpenAI.

https://hackread.com/openai-guardrails-bypass-prompt-injection-attack/


Vuldb

CVE-2025-11160 | WPBakery Page Builder Plugin up to 8.6.1 on WordPress Custom JS cross site scripting

20:43 - 14/10/2025
  View item as page
A vulnerability was found in WPBakery Page Builder Plugin up to 8.6.1 on WordPress. It has been declared as problematic. Affected by this issue is some unknown functionality of the component Custom JS Module. Executing manipulation can lead to cross site scripting. This vulnerability is handled as CVE-2025-11160. The attack can be executed remotely. There is not any exploit available.

https://vuldb.com/?id.328517


CVE-2025-11161 | WPBakery Page Builder Plugin up to 8.6.1 on WordPress vc_custom_heading font_container cross site scripting

20:42 - 14/10/2025
  View item as page
A vulnerability was found in WPBakery Page Builder Plugin up to 8.6.1 on WordPress. It has been classified as problematic. Affected by this vulnerability is the function vc_custom_heading. Performing manipulation of the argument font_container results in cross site scripting. This vulnerability is known as CVE-2025-11161. Remote exploitation of the attack is possible. No exploit is available.

https://vuldb.com/?id.328516


CVE-2025-8561 | Ova Advent Plugin up to 1.1.7 on WordPress Shortcode cross site scripting

20:42 - 14/10/2025
  View item as page
A vulnerability was found in Ova Advent Plugin up to 1.1.7 on WordPress and classified as problematic. Affected is an unknown function of the component Shortcode Handler. Such manipulation leads to cross site scripting. This vulnerability is traded as CVE-2025-8561. The attack may be launched remotely. There is no exploit available.

https://vuldb.com/?id.328515


CVE-2025-11176 | Quick Featured Images Plugin up to 13.7.2 on WordPress qfi_set_thumbnail resource injection

20:42 - 14/10/2025
  View item as page
A vulnerability has been found in Quick Featured Images Plugin up to 13.7.2 on WordPress and classified as problematic. This impacts the function qfi_set_thumbnail. This manipulation causes improper control of resource identifiers. This vulnerability appears as CVE-2025-11176. The attack may be initiated remotely. There is no available exploit.

https://vuldb.com/?id.328514


CVE-2025-60535 | Wallos 4.1.1 GET Request currency cross-site request forgery

20:41 - 14/10/2025
  View item as page
A vulnerability, which was classified as problematic, was found in Wallos 4.1.1. This affects an unknown function of the file /endpoints/currency/currency of the component GET Request Handler. The manipulation results in cross-site request forgery. This vulnerability is reported as CVE-2025-60535. The attack can be launched remotely. No exploit exists.

https://vuldb.com/?id.328513


CVE-2025-54603 | Claroty Secure Access up to 4.0.2 improper authentication

20:40 - 14/10/2025
  View item as page
A vulnerability, which was classified as critical, has been found in Claroty Secure Access up to 4.0.2. The impacted element is an unknown function. The manipulation leads to improper authentication. This vulnerability is documented as CVE-2025-54603. The attack requires being on the local network. There is not any exploit available.

https://vuldb.com/?id.328512


CVE-2025-60537 | kafka-ui 0.6.0/0.7.2 CustomSerdeLoader.java input validation

20:40 - 14/10/2025
  View item as page
A vulnerability classified as problematic was found in kafka-ui 0.6.0/0.7.2. The affected element is an unknown function of the file /kafka/ui/serdes/CustomSerdeLoader.java. Executing manipulation can lead to improper input validation. This vulnerability is registered as CVE-2025-60537. The attack requires access to the local network. No exploit is available.

https://vuldb.com/?id.328511


CVE-2025-60536 | kafka-ui up to 0.7.2 Configure New Cluster Interface denial of service

20:40 - 14/10/2025
  View item as page
A vulnerability classified as problematic has been found in kafka-ui up to 0.7.2. Impacted is an unknown function of the component Configure New Cluster Interface. Performing manipulation results in denial of service. This vulnerability is cataloged as CVE-2025-60536. It is possible to initiate the attack remotely. There is no exploit available.

https://vuldb.com/?id.328510


CVE-2025-57563 | Starnet FastX up to 4.1.51 path traversal

20:39 - 14/10/2025
  View item as page
A vulnerability described as critical has been identified in Starnet FastX up to 4.1.51. This issue affects some unknown processing. Such manipulation leads to path traversal. This vulnerability is listed as CVE-2025-57563. The attack may be performed from remote. There is no available exploit.

https://vuldb.com/?id.328509


CVE-2025-8459 | Centreon Infra Monitoring up to 23.10.27/24.04.17/24.10.12 Monitoring Recurrent Downtime Scheduler cross site scripting

20:39 - 14/10/2025
  View item as page
A vulnerability marked as problematic has been reported in Centreon Infra Monitoring up to 23.10.27/24.04.17/24.10.12. This vulnerability affects unknown code of the component Monitoring Recurrent Downtime Scheduler Module. This manipulation causes cross site scripting. This vulnerability is tracked as CVE-2025-8459. The attack is possible to be carried out remotely. No exploit exists. It is suggested to upgrade the affected component.

https://vuldb.com/?id.328508


Debian.org/security











Microsoft Security

CVE-2025-47989 Azure Connected Machine Agent Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47989


CVE-2025-48004 Microsoft Brokering File System Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48004


CVE-2025-50174 Windows Device Association Broker Service Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Use after free in Windows Device Association Broker service allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50174


CVE-2025-53782 Microsoft Exchange Server Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Incorrect implementation of authentication algorithm in Microsoft Exchange Server allows an unauthorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53782


CVE-2025-55247 .NET Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Improper link resolution before file access ('link following') in .NET allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55247


CVE-2025-24990 Windows Agere Modem Driver Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. **Fax modem hardware dependent on this specific driver will no longer work on Windows.** Microsoft recommends removing any existing dependencies on this hardware.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990


CVE-2025-24052 Windows Agere Modem Driver Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. **Fax modem hardware dependent on this specific driver will no longer work on Windows.** Microsoft recommends removing any existing dependencies on this hardware.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052


CVE-2025-55320 Configuration Manager Elevation of Privilege Vulnerability

07:00 - 14/10/2025
  View item as page
Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55320


CVE-2025-55325 Windows Storage Management Provider Information Disclosure Vulnerability

07:00 - 14/10/2025
  View item as page
Buffer over-read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55325


CVE-2025-55333 Windows BitLocker Security Feature Bypass Vulnerability

07:00 - 14/10/2025
  View item as page
Incomplete comparison with missing factors in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55333


advisories.ncsc.nl

NCSC-2025-0316 [1.00] [M/H] Kwetsbaarheid verholpen in Microsoft SQL Server

18:52 - 14/10/2025
  View item as page
Microsoft heeft een kwetsbaarheid verholpen in de JDBC-driver voor SQL Server. Een kwaadwillende kan de kwetsbaarheid misbruiken om middels een Server-in-the-Middle-aanval toegang te krijgen tot gevoelige gegevens, zoals inloggegevens. Voor succesvol misbruik moet de kwaadwillende het slachtoffer misleiden verbinding te maken met een SQL-server onder controle van de kwaadwillende.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0316


NCSC-2025-0315 [1.00] [M/H] Kwetsbaarheden verholpen in Microsoft Office

18:38 - 14/10/2025
  View item as page
Microsoft heeft kwetsbaarheden verholpen in diverse Office producten. Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, willekeurige code uit te voeren met rechten van het slachtoffer, of toegang te krijgen tot gevoelige gegevens in de context van het slachtoffer. Voor succesvol misbruik moet de kwaadwillende het slachtoffer misleiden een malafide bestand te openen, of link te volgen. ``` Microsoft Office SharePoint: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59228 | 8.80 | Uitvoeren van willekeurige code | | CVE-2025-59237 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Microsoft Office Word: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59221 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-59222 | 7.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Microsoft Office Visio: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59226 | 7.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Microsoft Office PowerPoint: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59238 | 7.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Microsoft Office: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59234 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59227 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59229 | 5.50 | Denial-of-Service | |----------------|------|-------------------------------------| Microsoft Office Excel: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59231 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59233 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59235 | 7.10 | Toegang tot gevoelige gegevens | | CVE-2025-59236 | 8.40 | Uitvoeren van willekeurige code | | CVE-2025-59243 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59223 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59224 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59225 | 7.80 | Uitvoeren van willekeurige code | | CVE-2025-59232 | 7.10 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| ```

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0315


NCSC-2025-0314 [1.00] [M/H] Kwetsbaarheden verholpen in Microsoft System Center

18:27 - 14/10/2025
  View item as page
Microsoft heeft kwetsbaarheden verholpen in System Center Configuration Manager. Een kwaadwillende kan de kwetsbaarheden misbruiken om zich verhoogde rechten toe te kennen en daarmee mogelijk toegang krijgen tot gevoelige gegevens of willekeurige code uit te voeren met verhoogde rechten. Voor succesvol misbruik moet de kwaadwillende over voorafgaande authenticatie beschikken, of lokale toegang hebben tot het kwetsbare systeem. Voor lokaal misbruik is géén voorafgaande authenticatie benodigd.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0314


NCSC-2025-0313 [1.00] [M/H] Kwetsbaarheden verholpen in Microsoft Developer Tools

18:21 - 14/10/2025
  View item as page
Microsoft heeft kwetsbaarheden verholpen in diverse Developer Tools. Een kwaadwillende kan de kwetsbaarheden misbruiken om zich verhoogde rechten toe te kennen, beveiligingsmaatregelen te omzeilen en toegang te krijgen tot gevoelige gegevens. De ernstigste kwetsbaarheid heeft kenmerk CVE-2025-55315 toegewezen gekregen en bevindt zich in ASP .NET core. Een kwaadwillende kan de kwetsbaarheid misbruiken om middels http-request smuggling beveiligingsmaatregelen te omzeilen en zo toegang te krijgen tot gevoelige gegevens in de scope van de applicaties draaiend op de kwetsbare .NET core software. ``` .NET, .NET Framework, Visual Studio: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55248 | 4.80 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Visual Studio: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-54132 | 4.40 | Toegang tot gevoelige gegevens | | CVE-2025-55240 | 7.30 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Microsoft PowerShell: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-25004 | 7.30 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| ASP.NET Core: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55315 | 9.90 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| .NET: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55247 | 7.30 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| ```

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0313


NCSC-2025-0312 [1.00] [M/H] Kwetsbaarheden verholpen in Microsoft Exchange

18:16 - 14/10/2025
  View item as page
Microsoft heeft kwetsbaarheden verholpen in Exchange Server. Een kwaadwillende kan de kwetsbaarheden misbruiken om zich voor te doen als andere gebruiker en zich verhoogde rechten toe te kennen. Voor succesvol misbruik moet de kwaadwillende over voorafgaande authenticatie beschikken.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0312


NCSC-2025-0311 [1.00] [M/H] Kwetsbaarheden verholpen in Microsoft Azure

18:13 - 14/10/2025
  View item as page
Microsoft heeft kwetsbaarheden verholpen in diverse Azure componenten. Een kwaadwillende kan de kwetsbaarheden misbruiken om zich voor te doen als andere gebruiker en zich mogelijk verhoogde rechten toe te kennen, om zo toegang te krijgen tot gevoelige gegevens of willekeurige code uit te voeren met verhoogde rechten. De ernstigste kwetsbaarheden bevinden zich in Azure Entra ID en stellen een kwaadwillende in staat om zich verhoogde rechten toe te kennen. Deze kwetsbaarheden bevinden zich in een centrale component van Azure en zijn inmiddels verholpen. Voor deze kwetsbaarheden is verder geen actie benodigd en deze zijn opgenomen ter informatie. ``` Azure Connected Machine Agent: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-47989 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-58724 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Azure Entra ID: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59218 | 9.60 | Verkrijgen van verhoogde rechten | | CVE-2025-59246 | 9.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Redis Enterprise: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59271 | 8.70 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Confidential Azure Container Instances: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59291 | 8.20 | Verkrijgen van verhoogde rechten | | CVE-2025-59292 | 8.20 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Azure Monitor Agent: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59494 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-59285 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Azure PlayFab: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59247 | 8.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Azure Monitor: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55321 | 8.70 | Voordoen als andere gebruiker | |----------------|------|-------------------------------------| ```

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0311


NCSC-2025-0310 [1.00] [M/H] Kwetsbaarheden verholpen in Microsoft Windows

18:03 - 14/10/2025
  View item as page
Microsoft heeft kwetsbaarheden verholpen in Windows. Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade: - Denial-of-Service - Omzeilen van een beveiligingsmaatregel - Manipulatie van gegevens - Uitvoeren van willekeurige code (gebruikersrechten) - Uitvoeren van willekeurige code (root/adminrechten) - Toegang tot gevoelige gegevens - Verkrijgen van verhoogde rechten - Spoofing De ernstigste kwetsbaarheden hebben de kenmerken CVE-2025-49708 en CVE-2025-59287 toegewezen gekregen. De kwetsbaarheid met kenmerk CVE-2025-49708 bevindt zich in de Graphics Component en stelt een kwaadwillende in staat om uit een Virtual Machine (VM) te breken en acties uit te voeren op de onderliggende Host. De kwetsbaarheid met kenmerk CVE-2025-59287 bevindt zich in de Windows Server Update Servce (WSUS) en stelt een kwaadwillende in staat om op afstand willekeurige code uit te voeren op het kwetsbare systeem. Van de kwetsbaarheid met kenmerk CVE-2025-59230 meldt Microsoft informatie te hebben dat deze actief is misbruikt op verouderde systemen. De kwetsbaarheid bevindt zich in de Remote Access Connection Manager stelt een lokale, geauthenticeerde kwaadwillende in staat om zich SYSTEM-rechten toe te kennen en zo mogelijk willekeurige code uit te voeren als SYSTEM ``` Windows Confidential Virtual Machines (CVM): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-48813 | 6.30 | Voordoen als andere gebruiker | |----------------|------|-------------------------------------| Windows Resilient File System (ReFS): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55687 | 7.40 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows DirectX: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55678 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55698 | 7.70 | Denial-of-Service | |----------------|------|-------------------------------------| Windows DWM: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55681 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-58722 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Xbox: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-53768 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Kernel: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59186 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2025-59207 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-50152 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-55334 | 6.20 | Omzeilen van beveiligingsmaatregel | | CVE-2025-55679 | 5.10 | Toegang tot gevoelige gegevens | | CVE-2025-55683 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2025-55693 | 7.40 | Verkrijgen van verhoogde rechten | | CVE-2025-55699 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2025-59187 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-59194 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Routing and Remote Access Service (RRAS): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55700 | 6.50 | Toegang tot gevoelige gegevens | | CVE-2025-58717 | 6.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Inbox COM Objects: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58732 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-58735 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-59282 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-58730 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-58731 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-58733 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-58734 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-58736 | 7.00 | Uitvoeren van willekeurige code | | CVE-2025-58738 | 7.00 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Agere Windows Modem Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-24990 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-24052 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Active Directory Federation Services: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59258 | 6.20 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows Push Notification Core: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59211 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2025-59209 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows Authentication Methods: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59277 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-59275 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-59278 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows File Explorer: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58739 | 6.50 | Voordoen als andere gebruiker | | CVE-2025-59214 | 6.50 | Voordoen als andere gebruiker | |----------------|------|-------------------------------------| Data Sharing Service Client: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59200 | 7.70 | Voordoen als andere gebruiker | |----------------|------|-------------------------------------| Windows Hyper-V: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55328 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows NTFS: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55335 | 7.40 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows ETL Channel: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59197 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Microsoft Failover Cluster Virtual Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59260 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows Server Update Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59287 | 9.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Microsoft Windows Speech: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58715 | 8.80 | Verkrijgen van verhoogde rechten | | CVE-2025-58716 | 8.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows NTLM: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59284 | 3.30 | Voordoen als andere gebruiker | |----------------|------|-------------------------------------| Windows COM: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58725 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Network Connection Status Indicator (NCSI): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59201 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| TCG TPM2.0: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-2884 | 5.30 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows MapUrlToZone: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59208 | 7.10 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Internet Explorer: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59295 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Core Shell: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59185 | 6.50 | Voordoen als andere gebruiker | | CVE-2025-59244 | 6.50 | Voordoen als andere gebruiker | |----------------|------|-------------------------------------| Windows SMB Server: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58726 | 7.50 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Remote Access Connection Manager: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59230 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows PrintWorkflowUserSvc: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55685 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55686 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55689 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55331 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55684 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55688 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55690 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55691 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Taskbar Live: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59294 | 2.10 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows BitLocker: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55333 | 6.10 | Omzeilen van beveiligingsmaatregel | | CVE-2025-55338 | 6.10 | Omzeilen van beveiligingsmaatregel | | CVE-2025-55330 | 6.10 | Omzeilen van beveiligingsmaatregel | | CVE-2025-55332 | 6.10 | Omzeilen van beveiligingsmaatregel | | CVE-2025-55337 | 6.10 | Omzeilen van beveiligingsmaatregel | | CVE-2025-55682 | 6.10 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| NtQueryInformation Token function (ntifs.h): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55696 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows USB Video Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55676 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows Ancillary Function Driver for WinSock: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59242 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-58714 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Azure Local: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55697 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Local Session Manager (LSM): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59257 | 6.50 | Denial-of-Service | | CVE-2025-59259 | 6.50 | Denial-of-Service | | CVE-2025-58729 | 6.50 | Denial-of-Service | |----------------|------|-------------------------------------| Windows Resilient File System (ReFS) Deduplication Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59206 | 7.40 | Verkrijgen van verhoogde rechten | | CVE-2025-59210 | 7.40 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Virtualization-Based Security (VBS) Enclave: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-53717 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Cloud Files Mini Filter Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55336 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2025-55680 | 8.40 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows WLAN Auto Config Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55695 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Software Protection Platform (SPP): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59199 | 8.40 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Cryptographic Services: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58720 | 7.80 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Remote Desktop Client: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58718 | 8.80 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows StateRepository API: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59203 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Microsoft Windows Search Component: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59190 | 5.50 | Denial-of-Service | | CVE-2025-59198 | 5.00 | Denial-of-Service | | CVE-2025-59253 | 5.50 | Denial-of-Service | |----------------|------|-------------------------------------| Windows Failover Cluster: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-47979 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2025-59188 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows SMB Client: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59280 | 3.10 | Manipulatie van gegevens | |----------------|------|-------------------------------------| Windows Secure Boot: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-47827 | 4.60 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| Microsoft PowerShell: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-25004 | 7.30 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Microsoft Windows: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55701 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Microsoft Windows Codecs Library: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-54957 | 7.00 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Windows Error Reporting: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55692 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-55694 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows SSDP Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59196 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Storport.sys Driver: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59192 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Remote Desktop Protocol: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55340 | 7.00 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| Windows Connected Devices Platform Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58727 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows NDIS: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55339 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Health and Optimized Experiences Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59241 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Remote Desktop Services: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59202 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows High Availability Services: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59184 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Microsoft Brokering File System: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-48004 | 7.40 | Verkrijgen van verhoogde rechten | | CVE-2025-59189 | 7.40 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows DWM Core Library: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59254 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-59255 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Digital Media: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-53150 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-50175 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Hello: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-53139 | 7.70 | Omzeilen van beveiligingsmaatregel | |----------------|------|-------------------------------------| Connected Devices Platform Service (Cdpsvc): |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58719 | 4.70 | Verkrijgen van verhoogde rechten | | CVE-2025-55326 | 7.50 | Uitvoeren van willekeurige code | | CVE-2025-59191 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Device Association Broker service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-50174 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-55677 | 7.80 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Bluetooth Service: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58728 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-59290 | 7.80 | Verkrijgen van verhoogde rechten | | CVE-2025-59289 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Storage Management Provider: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-55325 | 5.50 | Toegang tot gevoelige gegevens | |----------------|------|-------------------------------------| Windows Management Services: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59204 | 5.50 | Toegang tot gevoelige gegevens | | CVE-2025-59193 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| Windows Remote Desktop: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-58737 | 7.00 | Uitvoeren van willekeurige code | |----------------|------|-------------------------------------| Microsoft Graphics Component: |----------------|------|-------------------------------------| | CVE-ID | CVSS | Impact | |----------------|------|-------------------------------------| | CVE-2025-59195 | 7.00 | Denial-of-Service | | CVE-2025-49708 | 9.90 | Uitvoeren van willekeurige code | | CVE-2016-9535 | 4.00 | Uitvoeren van willekeurige code | | CVE-2025-59205 | 7.00 | Verkrijgen van verhoogde rechten | | CVE-2025-59261 | 7.00 | Verkrijgen van verhoogde rechten | |----------------|------|-------------------------------------| ```

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0310


NCSC-2025-0309 [1.00] [M/H] Kwetsbaarheden verholpen in Siemens producten

11:22 - 14/10/2025
  View item as page
Siemens heeft kwetsbaarheden verholpen in diverse producten als SIMATIC, SINEC, SIPLUS en Solid Edge. De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade: - Denial-of-Service (DoS) - Manipulatie van gegevens - Omzeilen van een beveiligingsmaatregel - Omzeilen van authenticatie - (Remote) code execution (root/admin rechten) - Toegang tot systeemgegevens - Verhogen van rechten - Spoofing De kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0309


NCSC-2025-0308 [1.00] [M/H] Kwetsbaarheden verholpen in Juniper Networks Junos Space

08:31 - 13/10/2025
  View item as page
Juniper heeft kwetsbaarheden verholpen in Junos Space (Specifiek voor alle versies prior tot 24.1R4). De kwetsbaarheden bevinden zich in de wijze waarop Juniper Networks Junos Space gebruikersinvoer verwerkt. Aanvallers kunnen kwaadaardige scripts injecteren in verschillende pagina's, zoals de Device Template Definition, Global Search, en andere secties van de interface. Dit kan leiden tot ongeautoriseerde uitvoering van commando's met de rechten van de getroffen gebruiker. Omdat gebruikers in deze context vaak beheersrechten hebben, is niet uitgesloten dat uitvoer van commando's met verhoogde rechten kan plaatsvinden.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0308


NCSC-2025-0307 [1.00] [M/H] Kwetsbaarheid verholpen in Oracle E-Business Suite

07:52 - 13/10/2025
  View item as page
Oracle heeft een kwetsbaarheid verholpen in de Oracle Configurator component van Oracle E-Business Suite (Specifiek voor versies 12.2.3 tot en met 12.2.14). De kwetsbaarheid bevindt zich in de Oracle Configurator component van Oracle E-Business Suite, specifiek in de versies 12.2.3 tot en met 12.2.14. Deze kwetsbaarheid stelt niet-geauthenticeerde aanvallers in staat om toegang te krijgen tot kritieke gegevens. Dit probleem heeft een CVSS-score van 7.5 gekregen, wat wijst op een significante impact op de vertrouwelijkheid. De kwetsbaarheid kan leiden tot ongeautoriseerde blootstelling van gegevens.

https://advisories.ncsc.nl/advisory?id=NCSC-2025-0307


NCSC Nieuws

28 publieke en private partijen tekenen convenant samenwerking Cyclotron

14:08 - 30/09/2025
  View item as page
Vandaag heeft het NCSC samen met 27 partijen het convenant samenwerking Cyclotron ondertekend op de ONE Conference. De ondertekenaars zijn een groot aantal private partijen en daarnaast ook de AIVD, MIVD, Politie en het NCTV. De ondertekening is een volgende belangrijke stap in de samenwerking met als doel om het beeld op cyberdreigingen en incidenten te versterken door het structureel delen van informatie, het gezamenlijk analyseren van informatie en het verstrekken van informatie uit die analyses aan belanghebbende organisaties. Hiermee wordt de digitale weerbaarheid van Nederland verhoogd.

https://www.ncsc.nl/actueel/nieuws/2025/09/30/28-publieke-en-private-partijen-te


Subsidie voor mkb-bedrijven nog 1 maand beschikbaar

12:29 - 26/09/2025
  View item as page
Voor kleine bedrijven die een financiële drempel ervaren bij het (laten) uitvoeren van cybermaatregelen, is tijdelijk een subsidie beschikbaar: Mijn Cyberweerbare Zaak. Deze subsidie dekt 50% van de kosten van diverse cybermaatregelen, tot een maximum van € 1.250. Kleinere bedrijven met 1 tot en met 50 medewerkers voor wie cybersecurity vaak niet een kerntaak is, kunnen nu met deze subsidie van het ministerie van Economische Zaken de nodige stappen zetten om hun bedrijf beter te beschermen tegen de toenemende cyberdreigingen en eisen die andere bedrijven in de bedrijfsketen stellen.

https://www.ncsc.nl/actueel/nieuws/2025/09/26/subsidie-voor-mkb-bedrijven-nog-1-


Cyberweerbaarheidsnetwerk bouwplan voor stevigere basis van cyberweerbaarheid in het Koninkrijk der Nederlanden

13:25 - 10/09/2025
  View item as page
De cyberweerbaarheid van Nederland is niet langer op te vangen met losse initiatieven. Deze tijd vraagt om één samenhangend netwerk: het Cyberweerbaarheidsnetwerk, kortweg CWN. In het CWN komen publieke en private organisaties samen. Daar brengen ze hun kennis, expertise en ervaring in om gezamenlijk aan opgaven te werken die bijdragen aan de cyberweerbaarheid van alle organisaties in het Koninkrijk der Nederlanden, en daarmee ook de overzeese gebieden. Want alleen samen worden we weerbaarder.

https://www.ncsc.nl/actueel/nieuws/2025/09/10/cyberweerbaarheidsnetwerk-bouwplan


Nieuwe malwarecampagne ontdekt via ManualFinder

10:26 - 29/08/2025
  View item as page
Recentelijk kwam een wereldwijde malwareinfectie van Windows computers aan het licht dankzij software die gebruikers zelf installeerden. Het NCSC adviseert daarom toegang tot de betreffende C2-domeinen te blokkeren, te controleren op de aanwezigheid van de applicaties “Manualfinder”, “PDF-editor” en varianten daarvan, te controleren op de aanwezigheid van JavaScript bestanden met een op een GUID lijkende naam in de directory /AppData/Local/TEMP en om eindgebruikers er met klem op te wijzen om geen externe, onvertrouwde tools te installeren.

https://www.ncsc.nl/actueel/nieuws/2025/08/29/nieuwe-malwarecampagne-ontdekt-via


Nieuwe kwetsbaarheden in Citrix Netscaler ontdekt

18:25 - 26/08/2025
  View item as page
Er zijn nieuwe kwetsbaarheden in Citrix Netscaler ontdekt. Met een eerder gepubliceerd detectiescript van het NCSC kan compromittatie worden gedetecteerd.

https://www.ncsc.nl/actueel/nieuws/2025/08/26/nieuwe-kwetsbaarheden-in-citrix-ne


Eefje Zents Chief Relations Officer/directeur Samenwerking Digitale weerbaarheid bij NCSC

09:30 - 15/08/2025
  View item as page
Eefje Zents wordt met ingang van 15 september 2025 Chief Relations Officer/directeur Samenwerking Digitale weerbaarheid bij het Nationaal Cyber Security Centrum (NCSC) van het ministerie van Justitie en Veiligheid.

https://www.ncsc.nl/actueel/nieuws/2025/08/15/eefje-zents-chief-relations-office


Casus: Citrix kwetsbaarheid (Update 13-08-2025)

11:13 - 13/08/2025
  View item as page
Via deze pagina biedt het NCSC een update op de eerdere berichtgeving. We bieden hierin de publicatie van twee nieuwe checkscripts die voorzien zijn van nieuwe indicators of compromise, aanvullende context waarbij we belichten dat het hier om een geraffineerde aanval gaat waarbij meerdere Nederlandse organisaties succesvol aangevallen zijn. Daarnaast deelt het NCSC aanvullende adviezen in het licht van deze digitale aanval. Hiermee willen we organisaties aansporen en ondersteunen om hun digitale weerbaarheid verder te verhogen en zich op de juiste elementen van digitale veiligheid te richten.

https://www.ncsc.nl/actueel/nieuws/2025/07/22/casus-citrix-kwetsbaarheid


Casus: Microsoft SharePoint Server kwetsbaarheden

16:27 - 23/07/2025
  View item as page
Op deze pagina gaat het NCSC verder in op de recent ontdekte kwetsbaarheden in Microsoft SharePoint Server en bieden we handelingsperspectief in het omgaan met deze kwetsbaarheden.

https://www.ncsc.nl/actueel/nieuws/2025/07/23/casus-microsoft-sharepoint


Laatste update: Kwetsbaarheden in Microsoft SharePoint Server actief misbruikt

12:54 - 22/07/2025
  View item as page
Het NCSC waarschuwt organisaties voor ernstige kwetsbaarheden in Microsoft SharePoint Server. Microsoft heeft inmiddels beveiligingsupdates beschikbaar gesteld voor de kwetsbare systemen. Omdat het NCSC actief misbruik ziet, is het nadrukkelijke advies om de updates zo snel mogelijk te installeren. De kwetsbaarheden in Microsoft SharePoint Server staan los van de kwetsbaarheden in de Citrix-producten waarvoor het NCSC al eerder waarschuwde.

https://www.ncsc.nl/actueel/nieuws/2025/07/20/kwetsbaarheden-in-microsoft-sharep


Informatie over kwetsbaarheden in Citrix NetScaler ADC en NetScaler Gateway

17:19 - 21/07/2025
  View item as page
Het NCSC heeft beveiligingsadviezen uitgebracht ten aanzien van kwetsbaarheden Citrix NetScaler ADC en NetScaler Gateway. Op dit moment is er sprake van actief misbruik, waardoor het NCSC hier opnieuw aandacht voor vraagt. Citrix heeft inmiddels updates beschikbaar gesteld om deze kwetsbaarheden te verhelpen. Het NCSC roept organisaties met klem op om de maatregelen uit de adviezen te volgen en systemen te controleren op compromittatie.

https://www.ncsc.nl/actueel/nieuws/2025/07/21/informatie-over-kwetsbaarheden-in-


wid.cert-bund.de

[UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen

19:59 - 14/10/2025
  View item as page
Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um Daten zu manipulieren oder einen Denial of Service herbeizuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2268


[NEU] [hoch] Veeam Backup & Replication: Mehrere Schwachstellen

11:39 - 14/10/2025
  View item as page
Ein Angreifer kann mehrere Schwachstellen in Veeam Backup & Replication ausnutzen, um beliebigen Programmcode auszuführen und sich erweiterte Berechtigungen zu verschaffen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2274


[UPDATE] [hoch] LibTiff: Schwachstelle ermöglicht Codeausführung

11:24 - 14/10/2025
  View item as page
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in LibTiff ausnutzen, um einen Code auszuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2110


[UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen

11:24 - 14/10/2025
  View item as page
Ein entfernter Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen und nicht näher spezifizierte Auswirkungen zu erzielen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1417



[UPDATE] [hoch] Linux UDisks Daemon: Schwachstelle ermöglicht Privilegieneskalation

11:24 - 14/10/2025
  View item as page
Ein lokaler Angreifer kann eine Schwachstelle im Linux UDisks Daemon ausnutzen, um seine Privilegien zu erhöhen oder einen Denial of Service herbeizuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1928


[UPDATE] [hoch] Podman: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen

11:24 - 14/10/2025
  View item as page
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Podman ausnutzen, um Sicherheitsvorkehrungen zu umgehen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1389


[UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen

11:24 - 14/10/2025
  View item as page
Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen oder einen unspezifischen Angriff durchzuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3368


[UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen

11:24 - 14/10/2025
  View item as page
Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen oder andere nicht spezifizierte Angriffe durchzuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1665


[UPDATE] [hoch] bluez: Schwachstelle ermöglicht Codeausführung

11:24 - 14/10/2025
  View item as page
Ein Angreifer in Funk-Reichweite kann eine Schwachstelle in bluez ausnutzen, um beliebigen Programmcode auszuführen.

https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-3086


cert.ssi.gouv.fr

Multiples vulnérabilités dans les produits Mattermost (17 septembre 2025)

00:00 - 17/09/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans les produits Mattermost. Elles permettent à un attaquant de provoquer un déni de service à distance et un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0801/


Multiples vulnérabilités dans les produits VMware (30 septembre 2025)

00:00 - 30/09/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0832/


Multiples vulnérabilités dans Joomla! (01 octobre 2025)

00:00 - 01/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Joomla!. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0833/


Multiples vulnérabilités dans Mozilla Firefox (01 octobre 2025)

00:00 - 01/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0834/


Multiples vulnérabilités dans OpenSSL (01 octobre 2025)

00:00 - 01/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans OpenSSL. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0835/


Multiples vulnérabilités dans les produits Tenable (01 octobre 2025)

00:00 - 01/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Tenable Security Center. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0836/


Multiples vulnérabilités dans Google Chrome (02 octobre 2025)

00:00 - 02/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0837/


Multiples vulnérabilités dans les produits Splunk (02 octobre 2025)

00:00 - 02/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0838/


Multiples vulnérabilités dans Microsoft Edge (03 octobre 2025)

00:00 - 03/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0839/


Multiples vulnérabilités dans Zabbix (03 octobre 2025)

00:00 - 03/10/2025
  View item as page
De multiples vulnérabilités ont été découvertes dans Zabbix. Elles permettent à un attaquant de provoquer une élévation de privilèges et une atteinte à la confidentialité des données.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0840/


theHackerNews

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

22:25 - 14/10/2025
  View item as page
Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for more than a year. The activity, per ReliaQuest, is the handiwork of a Chinese state-sponsored hacking group called Flax Typhoon, which is also tracked as Ethereal Panda and RedJuliett. According to the U.S. government, it's assessed to be a publicly-traded

https://thehackernews.com/2025/10/chinese-hackers-exploit-arcgis-server.html


Moving Beyond Awareness: How Threat Hunting Builds Readiness

17:25 - 14/10/2025
  View item as page
Every October brings a familiar rhythm - pumpkin-spice everything in stores and cafés, alongside a wave of reminders, webinars, and checklists in my inbox. Halloween may be just around the corner, yet for those of us in cybersecurity, Security Awareness Month is the true seasonal milestone. Make no mistake, as a security professional, I love this month. Launched by CISA and the National

https://thehackernews.com/2025/10/moving-beyond-awareness-how-threat.html


RMPocalypse: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing

17:15 - 14/10/2025
  View item as page
Chipmaker AMD has released fixes to address a security flaw dubbed RMPocalypse that could be exploited to undermine confidential computing guarantees provided by Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). The attack, per ETH Zürich researchers Benedict Schlüter and Shweta Shinde, exploits AMD's incomplete protections that make it possible to perform a single memory

https://thehackernews.com/2025/10/rmpocalypse-single-8-byte-write.html


New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions

16:48 - 14/10/2025
  View item as page
Android devices from Google and Samsung have been found vulnerable to a side-channel attack that could be exploited to covertly steal two-factor authentication (2FA) codes, Google Maps timelines, and other sensitive data without the users' knowledge pixel-by-pixel. The attack has been codenamed Pixnapping by a group of academics from the University of California (Berkeley), University of

https://thehackernews.com/2025/10/new-pixnapping-android-flaw-lets-rogue.html


What AI Reveals About Web Applications— and Why It Matters

16:30 - 14/10/2025
  View item as page
Before an attacker ever sends a payload, they’ve already done the work of understanding how your environment is built. They look at your login flows, your JavaScript files, your error messages, your API documentation, your GitHub repos. These are all clues that help them understand how your systems behave. AI is significantly accelerating reconnaissance and enabling attackers to map your

https://thehackernews.com/2025/10/what-ai-reveals-about-web-applications.html


npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels

12:39 - 14/10/2025
  View item as page
Cybersecurity researchers have identified several malicious packages across npm, Python, and Ruby ecosystems that leverage Discord as a command-and-control (C2) channel to transmit stolen data to actor-controlled webhooks. Webhooks on Discord are a way to post messages to channels in the platform without requiring a bot user or authentication, making them an attractive mechanism for attackers to

https://thehackernews.com/2025/10/npm-pypi-and-rubygems-packages-found.html


Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain

10:58 - 14/10/2025
  View item as page
Cybersecurity researchers have shed light on a previously undocumented threat actor called TA585 that has been observed delivering an off-the-shelf malware called MonsterV2 via phishing campaigns. The Proofpoint Threat Research Team described the threat activity cluster as sophisticated, leveraging web injections and filtering checks as part of its attack chains. "TA585 is notable because it

https://thehackernews.com/2025/10/researchers-expose-ta585s-monsterv2.html


⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More

18:48 - 13/10/2025
  View item as page
Every week, the cyber world reminds us that silence doesn’t mean safety. Attacks often begin quietly — one unpatched flaw, one overlooked credential, one backup left unencrypted. By the time alarms sound, the damage is done. This week’s edition looks at how attackers are changing the game — linking different flaws, working together across borders, and even turning trusted tools into weapons.

https://thehackernews.com/2025/10/weekly-recap-whatsapp-worm-critical.html


Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk

17:20 - 13/10/2025
  View item as page
Think your WAF has you covered? Think again. This holiday season, unmonitored JavaScript is a critical oversight allowing attackers to steal payment data while your WAF and intrusion detection systems see nothing. With the 2025 shopping season weeks away, visibility gaps must close now. Get the complete Holiday Season Security Playbook here. Bottom Line Up Front The 2024 holiday season saw major

https://thehackernews.com/2025/10/why-unmonitored-javascript-is-your.html


Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors

15:42 - 13/10/2025
  View item as page
Malware campaigns distributing the RondoDox botnet have expanded their targeting focus to exploit more than 50 vulnerabilities across over 30 vendors. The activity, described as akin to an "exploit shotgun" approach, has singled out a wide range of internet-exposed infrastructure, including routers, digital video recorders (DVRs), network video recorders (NVRs), CCTV systems, web servers, and

https://thehackernews.com/2025/10/researchers-warn-rondodox-botnet-is.html


Techrepublic

CamoLeak: GitHub Copilot Flaw Allowed Silent Data Theft

15:34 - 14/10/2025
  View item as page

A GitHub Copilot Chat bug let attackers steal private code via prompt injection. Learn how CamoLeak worked and how to defend against AI risks.

The post CamoLeak: GitHub Copilot Flaw Allowed Silent Data Theft appeared first on TechRepublic.

https://www.techrepublic.com/article/news-github-copilot-data-theft/


Critical Oracle EBS Flaw Could Expose Sensitive Data

21:40 - 13/10/2025
  View item as page

Oracle patches a high-severity EBS flaw that could let attackers bypass authentication and access sensitive enterprise data.

The post Critical Oracle EBS Flaw Could Expose Sensitive Data appeared first on TechRepublic.

https://www.techrepublic.com/article/news-oracle-ebs-vulnerability/


New Playbook Offers Guidelines on Advancing Transformative Responsible AI

19:48 - 03/10/2025
  View item as page

The World Economic Forum and Accenture offer a practical roadmap for organizations to leverage responsible AI into a competitive advantage.

The post New Playbook Offers Guidelines on Advancing Transformative Responsible AI appeared first on TechRepublic.

https://www.techrepublic.com/article/news-advance-transformative-responsible-ai-


Oracle Extortion Case: $50M Demand From ‘Notorious’ Hacking Group

22:32 - 02/10/2025
  View item as page

After breaching the security of Oracle’s E-Business Suite, a well-known group of hackers is actively trying to extort execs for millions of dollars.

The post Oracle Extortion Case: $50M Demand From ‘Notorious’ Hacking Group appeared first on TechRepublic.

https://www.techrepublic.com/article/news-oracle-e-business-suite-breach-ransom-


Microsoft Unveils 365 Premium, Its New Top-Tier AI and Productivity Bundle

22:00 - 02/10/2025
  View item as page

Microsoft 365 Premium subscription bundles Copilot AI and Office apps for $19.99/month. It replaces Copilot Pro and offers a secure way to use AI at work.

The post Microsoft Unveils 365 Premium, Its New Top-Tier AI and Productivity Bundle appeared first on TechRepublic.

https://www.techrepublic.com/article/news-microsoft-365-premium/




What Does the Government Shutdown Mean for Cybersecurity?

20:30 - 01/10/2025
  View item as page

CISA is among the government agencies affected. The shutdown is a reminder for government contractors to harden their cybersecurity.

The post What Does the Government Shutdown Mean for Cybersecurity? appeared first on TechRepublic.

https://www.techrepublic.com/article/news-government-shutdown-2025/


Google Adds AI-Powered Ransomware Protection and Recovery to Drive for Desktop

17:32 - 01/10/2025
  View item as page

This new ransomware detection is available in beta in Google Drive for desktop on Windows or macOS, with a general release expected by the end of the year.

The post Google Adds AI-Powered Ransomware Protection and Recovery to Drive for Desktop appeared first on TechRepublic.

https://www.techrepublic.com/article/news-google-drive-ai-ransomware-detection/


UK Police Convicts Pair in £5.5 Billion Bitcoin Launder Case

17:05 - 01/10/2025
  View item as page

Two defendants pleaded guilty in a Bitcoin laundering case tied to the UK's record crypto seizure. The Met’s seven-year probe moves to sentencing 10–11 November.

The post UK Police Convicts Pair in £5.5 Billion Bitcoin Launder Case appeared first on TechRepublic.

https://www.techrepublic.com/article/news-uk-record-bitcoin-seizure/


BleepingComputer.com

Malicious crypto-stealing VSCode extensions resurface on OpenVSX

17:35 - 14/10/2025
  View item as page
A threat actor called TigerJack is constantly targeting developers with malicious extensions published on Microsoft's Visual Code (VSCode) marketplace and OpenVSX registry to steal cryptocurrency and plant backdoors. [...]

https://www.bleepingcomputer.com/news/security/malicious-crypto-stealing-vscode-


Final Windows 10 Patch Tuesday update rolls out as support ends

15:07 - 14/10/2025
  View item as page
In what marks the end of an era, Microsoft has released the Windows 10 KB5066791 cumulative update, the final free update for the operating system as it reaches the end of its support lifecycle. [...]

https://www.bleepingcomputer.com/news/microsoft/final-windows-10-patch-tuesday-u


New Android Pixnapping attack steals MFA codes pixel-by-pixel

14:46 - 14/10/2025
  View item as page
A new side-channel attack called Pixnapping enables a malicious Android app with no permissions to extract sensitive data by stealing pixels displayed by applications or websites, and reconstructing them to derive the content. [...]

https://www.bleepingcomputer.com/news/security/new-android-pixnapping-attack-ste


Microsoft: Exchange 2016 and 2019 have reached end of support

14:26 - 14/10/2025
  View item as page
Microsoft has reminded that Exchange Server 2016 and 2019 reached the end of support and advised IT administrators to upgrade servers to Exchange Server SE or migrate to Exchange Online. [...]

https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-2016-and-2019


Microsoft October 2025 Patch Tuesday fixes 6 zero-days, 172 flaws

14:02 - 14/10/2025
  View item as page
Today is Microsoft's October 2025 Patch Tuesday, which includes security updates for 172 flaws, including six zero-day vulnerabilities. Get patching! [...]

https://www.bleepingcomputer.com/news/microsoft/microsoft-october-2025-patch-tue


Windows 11 KB5066835 and KB5066793 updates released

13:46 - 14/10/2025
  View item as page
Microsoft has released Windows 11 KB5066835 and KB5066793 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities and issues. [...]

https://www.bleepingcomputer.com/news/microsoft/windows-11-kb5066835-and-kb50667


US seizes $15 billion in crypto from 'pig butchering' kingpin

13:37 - 14/10/2025
  View item as page
The U.S. Department of Justice has seized $15 billion in bitcoin from the leader of Prince Group, a criminal organization that stole billions of dollars from victims in the United States through cryptocurrency investment scams, also known as romance baiting or pig butchering. [...]

https://www.bleepingcomputer.com/news/security/us-seizes-15-billion-in-crypto-fr


Oracles silently fixes zero-day exploit leaked by ShinyHunters

12:38 - 14/10/2025
  View item as page
Oracle has silently fixed an Oracle E-Business Suite vulnerability (CVE-2025-61884) that was actively exploited to breach servers, with a proof-of-concept exploit publicly leaked by the ShinyHunters extortion group. [...]

https://www.bleepingcomputer.com/news/security/oracles-silently-fixes-zero-day-e


Microsoft warns that Windows 10 reaches end of support today

10:54 - 14/10/2025
  View item as page
Microsoft has reminded customers today that Windows 10 has reached the end of support and will no longer receive patches for newly discovered security vulnerabilities. [...]

https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-that-windows-10-


Security firms dispute credit for overlapping CVE reports

10:52 - 14/10/2025
  View item as page
FuzzingLabs has accused the YCombinator-backed startup, Gecko Security, of replicating its vulnerability disclosures. Gecko allegedly filed for 2 CVEs based on FuzzingLabs' reports without crediting them. Gecko denies any wrongdoing, calling the allegations a misunderstanding over disclosure process. [...]

https://www.bleepingcomputer.com/news/security/security-firms-dispute-credit-for


securityboulevard.com

The LLM Dependency Trap

19:30 - 14/10/2025
  View item as page

Large language models are reshaping how we write software. With a few prompts, developers can generate boilerplate, integrate dependencies, write tests, and scaffold entire systems in a fraction of the time it used to take.

The post The LLM Dependency Trap appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/the-llm-dependency-trap/


Aembit Connects AI and Workload Access to AWS Secrets Manager

19:29 - 14/10/2025
  View item as page

4 min readSay goodbye to long-lived personal access tokens as you replace them with ephemeral, policy-driven credentials and automated service account management.

The post Aembit Connects AI and Workload Access to AWS Secrets Manager appeared first on Aembit.

The post Aembit Connects AI and Workload Access to AWS Secrets Manager appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/aembit-connects-ai-and-workload-access-to-


NDSS 2025 – MADWeb 2025, Keynote 2 and Session 3

19:00 - 14/10/2025
  View item as page

Author, Creator & Presenter: Keynote2: Frederik Braun (Mozilla)

Session 3: Web3 and Work in Progress: Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2025, co-located with the Network and Distributed System Security (NDSS) Symposium 2025

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the organization’s’YouTube channel.

Permalink

The post NDSS 2025 – MADWeb 2025, Keynote 2 and Session 3 appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/ndss-2025-madweb-2025-keynote-2-and-sessio


Beyond Alerts: Building Smarter, Context-Aware Threat Detection

18:11 - 14/10/2025
  View item as page

Jeff Reed, chief product officer at Vectra AI, talks about the company’s latest advances in detection and response—and how AI is transforming the way enterprises defend against modern cyber threats. Reed, who joined Vectra after years leading cloud security and product teams at Google, explains that traditional approaches to threat detection are no longer sufficient...

The post Beyond Alerts: Building Smarter, Context-Aware Threat Detection appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/beyond-alerts-building-smarter-context-awa


Preparing for the Next Wave of AI-Driven Threats

18:03 - 14/10/2025
  View item as page

Cristian Rodriguez, Field CTO for the Americas at CrowdStrike, discusses how artificial intelligence and evolving threat dynamics are reshaping cybersecurity. Rodriguez brings a unique perspective—equal parts technical and creative—describing how CrowdStrike continues to innovate in an era defined by speed and complexity. He notes that attackers are evolving just as quickly as defenders, with AI..

The post Preparing for the Next Wave of AI-Driven Threats appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/preparing-for-the-next-wave-of-ai-driven-t


China’s Flax Typhoon Exploits ArcGIS App for Year-Long Persistence

17:51 - 14/10/2025
  View item as page

The China-based APT group Flax Typhoon used a function within ArcGIS' legitimate geo-mapping software to create a webshell through which it established persistence for more than a year to execute malicious commands and steal credentials.

The post China’s Flax Typhoon Exploits ArcGIS App for Year-Long Persistence appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/chinas-flax-typhoon-exploits-arcgis-app-fo


The Defensive Gap: Why Modern SOCs Are Losing Ground and How to Close It

17:44 - 14/10/2025
  View item as page

Despite continued investments in SIEMs, threat intelligence platforms, and managed detection services, many Security Operations Centers (SOCs) remain in a defensive position. SOCs are reactive, overstretched, and underprepared. High-profile breaches continue to grab headlines, but they are only what is visible. The reality is that SOC teams are overwhelmed by alert fatigue, organizational friction, and..

The post The Defensive Gap: Why Modern SOCs Are Losing Ground and How to Close It appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/the-defensive-gap-why-modern-socs-are-losi


The Endpoint Has Moved to the Browser — Your Security Tools Haven’t

17:35 - 14/10/2025
  View item as page

Your users aren’t downloading files to their desktops anymore. They’re not running local applications. They’re working in Google Docs, Salesforce, Slack, and dozens of other browser-based platforms. The endpoint—the place where work actually happens—has moved entirely into the browser. Your security tools haven’t made that move with them. Legacy vendors built traditional Secure Web Gateways..

The post The Endpoint Has Moved to the Browser — Your Security Tools Haven’t appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/the-endpoint-has-moved-to-the-browser-your


What is OT Breach Ready Cyber Defense?

15:38 - 14/10/2025
  View item as page

Learn how microsegmentation builds OT breach ready cyber defense, limits lateral movement, and protects industrial systems from disruptions.

The post What is OT Breach Ready Cyber Defense? appeared first on ColorTokens.

The post What is OT Breach Ready Cyber Defense? appeared first on Security Boulevard.

https://securityboulevard.com/2025/10/what-is-ot-breach-ready-cyber-defense/



CXSecurity.com

Perfex CRM Chatbot Cross Site Scripting

19:56 - 12/10/2025
  View item as page
Topic: Perfex CRM Chatbot Cross Site Scripting Risk: Low Text:# CVE-2025-60374 CVE-2025-60374: Stored Cross-Site Scripting (XSS) in Perfex CRM Chatbot > **⚠️ Security Advisory** ...

https://cxsecurity.com/issue/WLB-2025100008


DirectAdmin v1.680 DOM Injection via return-to Parameter

20:00 - 09/10/2025
  View item as page
Topic: DirectAdmin v1.680 DOM Injection via return-to Parameter Risk: Low Text: # Exploit Title: DirectAdmin v1.680 DOM Injection via return-to Parameter (UI Misrepresentation) # E...

https://cxsecurity.com/issue/WLB-2025100007


SugarCRM unauthenticated Remote Code Execution (RCE)

21:08 - 07/10/2025
  View item as page
Topic: SugarCRM unauthenticated Remote Code Execution (RCE) Risk: High Text:# Exploit Title: SugarCRM unauthenticated Remote Code Execution (RCE) # Exploit Author: DANG # Vendor Homepage: https://www.s...

https://cxsecurity.com/issue/WLB-2025100006


GaatiTrack-1.0 Copyright©2025-Multiple-SQLi - Metasploit module

21:07 - 07/10/2025
  View item as page
Topic: GaatiTrack-1.0 Copyright©2025-Multiple-SQLi - Metasploit module Risk: Medium Text:# Titles: GaatiTrack-1.0 Copyright©2025-Multiple-SQLi - Metasploit module # Author: nu11secur1ty # Date: 10/06/2025 # Vend...

https://cxsecurity.com/issue/WLB-2025100005


CPAS Audit Management Information System 4.9 SQL Injection

15:36 - 05/10/2025
  View item as page
Topic: CPAS Audit Management Information System 4.9 SQL Injection Risk: Medium Text:# CPAS-bug CPAS audit management information system has SQL injection vulnerability # Beijing YouDataSum Technology Co., Lt...

https://cxsecurity.com/issue/WLB-2025100004


ERPNext 15.67.0 / Frappe 15.72.4 Cross Site Scripting

15:33 - 05/10/2025
  View item as page
Topic: ERPNext 15.67.0 / Frappe 15.72.4 Cross Site Scripting Risk: Low Text:...

https://cxsecurity.com/issue/WLB-2025100003


nopCommerce 4.40.3 - Stored Cross-Site Scripting (XSS)

20:54 - 01/10/2025
  View item as page
Topic: nopCommerce 4.40.3 - Stored Cross-Site Scripting (XSS) Risk: Low Text:# Exploit Title: nopCommerce 4.40.3 - Stored Cross-Site Scripting (XSS) # Exploit Author: Scott Sturrock 'ssturrock -at- proto...

https://cxsecurity.com/issue/WLB-2025100002


DirectAdmin v1.680 DOM Injection via return-to Parameter (UI Misrepresentation)

20:54 - 01/10/2025
  View item as page
Topic: DirectAdmin v1.680 DOM Injection via return-to Parameter (UI Misrepresentation) Risk: Medium Text:# Exploit Title: DirectAdmin v1.680 DOM Injection via return-to Parameter (UI Misrepresentation) # Exploit Author: Scott Sturr...

https://cxsecurity.com/issue/WLB-2025100001


WordPress Quentn WP 1.2.8 Privilege Escalation

20:53 - 30/09/2025
  View item as page
Topic: WordPress Quentn WP 1.2.8 Privilege Escalation Risk: Medium Text:#!/usr/bin/env python3 # -*- coding: utf-8 -*- import argparse import base64 import hashlib import json import random ...

https://cxsecurity.com/issue/WLB-2025090016


StoryChief Wordpress Plugin 1.0.42 Arbitrary File Upload

20:52 - 30/09/2025
  View item as page
Topic: StoryChief Wordpress Plugin 1.0.42 Arbitrary File Upload Risk: High Text:# Exploit Title: StoryChief Wordpress Plugin 1.0.42 - Arbitrary File Upload # Exploit Author: xpl0dec # Vendor Homepage: http...

https://cxsecurity.com/issue/WLB-2025090015


Brian Krebs

DDoS Botnet Aisuru Blankets US ISPs in Record DDoS

16:10 - 10/10/2025
  View item as page
The world's largest and most disruptive botnet is now drawing a majority of its firepower from compromised Internet-of-Things (IoT) devices hosted on U.S. Internet providers like AT&T, Comcast and Verizon, new evidence suggests. Experts say the heavy concentration of infected devices at U.S. providers is complicating efforts to limit collateral damage from the botnet's attacks, which shattered previous records this week with a brief traffic flood that clocked in at nearly 30 trillion bits of data per second.

https://krebsonsecurity.com/2025/10/ddos-botnet-aisuru-blankets-us-isps-in-recor


ShinyHunters Wage Broad Corporate Extortion Spree

22:45 - 07/10/2025
  View item as page
A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has launched a website that threatens to publish data stolen from dozens of Fortune 500 firms if they refuse to pay a ransom. The group also claimed responsibility for a recent breach involving Discord user data, and for stealing terabytes of sensitive files from thousands of customers of the enterprise software maker Red Hat.

https://krebsonsecurity.com/2025/10/shinyhunters-wage-broad-corporate-extortion-


Feds Tie ‘Scattered Spider’ Duo to $115M in Ransoms

11:48 - 24/09/2025
  View item as page
U.S. prosecutors last week levied criminal hacking charges against 19-year-old U.K. national Thalha Jubair for allegedly being a core member of Scattered Spider, a prolific cybercrime group blamed for extorting at least $115 million in ransom payments from victims. The charges came as Jubair and an alleged co-conspirator appeared in a London court to face accusations of hacking into and extorting several large U.K. retailers, the London transit system, and healthcare providers in the United States.

https://krebsonsecurity.com/2025/09/feds-tie-scattered-spider-duo-to-115m-in-ran


Self-Replicating Worm Hits 180+ Software Packages

14:08 - 16/09/2025
  View item as page
At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers and publishes those secrets on GitHub, experts warn. The malware, which briefly infected multiple code packages from the security vendor CrowdStrike, steals and publishes even more credentials every time an infected package is installed.

https://krebsonsecurity.com/2025/09/self-replicating-worm-hits-180-software-pack


Bulletproof Host Stark Industries Evades EU Sanctions

17:40 - 11/09/2025
  View item as page
In May 2025, the European Union levied financial sanctions on the owners of Stark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and quickly became a top source of Kremlin-linked cyberattacks and disinformation campaigns. But new data shows those sanctions have done little to stop Stark from simply rebranding and transferring their assets to other corporate entities controlled by its original hosting providers.

https://krebsonsecurity.com/2025/09/bulletproof-host-stark-industries-evades-eu-


Microsoft Patch Tuesday, September 2025 Edition

21:21 - 09/09/2025
  View item as page
Microsoft Corp. today issued security updates to fix more than 80 vulnerabilities in its Windows operating systems and software. There are no known "zero-day" or actively exploited vulnerabilities in this month's bundle from Redmond, which nevertheless includes patches for 13 flaws that earned Microsoft's most-dire "critical" label. Meanwhile, both Apple and Google recently released updates to fix zero-day bugs in their devices.

https://krebsonsecurity.com/2025/09/microsoft-patch-tuesday-september-2025-editi


18 Popular Code Packages Hacked, Rigged to Steal Crypto

22:53 - 08/09/2025
  View item as page
At least 18 popular JavaScript code packages that are collectively downloaded more than two billion times each week were briefly compromised with malicious software today, after a developer involved in maintaining the projects was phished. The attack appears to have been quickly contained and was narrowly focused on stealing cryptocurrency. But experts warn that a similar attack with a slightly more nefarious payload could quickly lead to a disruptive malware outbreak that is far more difficult to detect and restrain.

https://krebsonsecurity.com/2025/09/18-popular-code-packages-hacked-rigged-to-st


GOP Cries Censorship Over Spam Filters That Work

03:23 - 06/09/2025
  View item as page
The chairman of the Federal Trade Commission (FTC) last week sent a letter to Google's CEO demanding to know why Gmail was blocking messages from Republican senders while allegedly failing to block similar missives supporting Democrats. The letter followed media reports accusing Gmail of disproportionately flagging messages from the GOP fundraising platform WinRed and sending them to the spam folder. But according to experts who track daily spam volumes worldwide, WinRed's messages are getting blocked more because its methods of blasting email are increasingly way more spammy than that of ActBlue, the fundraising platform for Democrats.

https://krebsonsecurity.com/2025/09/gop-cries-censorship-over-spam-filters-that-


The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft

21:55 - 01/09/2025
  View item as page
The recent mass-theft of authentication tokens from Salesloft, whose AI chatbot is used by a broad swath of corporate America to convert customer interaction into Salesforce leads, has left many companies racing to invalidate the stolen credentials before hackers can exploit them. Now Google warns the breach goes far beyond access to Salesforce data, noting the hackers responsible also stole valid authentication tokens for hundreds of online services that customers can integrate with Salesloft, including Slack, Google Workspace, Amazon S3, Microsoft Azure, and OpenAI.

https://krebsonsecurity.com/2025/09/the-ongoing-fallout-from-a-breach-at-ai-chat


Affiliates Flock to ‘Soulless’ Scam Gambling Machine

17:21 - 28/08/2025
  View item as page
Last month, KrebsOnSecurity tracked the sudden emergence of hundreds of polished online gaming and wagering websites that lure people with free credits and eventually abscond with any cryptocurrency funds deposited by players. We've since learned that these scam gambling sites have proliferated thanks to a new Russian affiliate program called "Gambler Panel" that bills itself as a "soulless project that is made for profit."

https://krebsonsecurity.com/2025/08/affiliates-flock-to-soulless-scam-gambling-m


Troy Hunt

Weekly Update 473

03:25 - 12/10/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

This week's video was recorded on Friday morning Aussie time, and as promised, hackers dumped data the following day. Listening back to parts of the video as I write this on a Sunday morning, pretty much what was predicted happened: data was dumped, it included Qantas, and the

https://www.troyhunt.com/weekly-update-473/


Court Injunctions are the Thoughts and Prayers of Data Breach Response

00:03 - 09/10/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

You see it all the time after a tragedy occurs somewhere, and people flock to offer their sympathies via the "thoughts and prayers" line. Sympathy is great, and we should all express that sentiment appropriately. The criticism, however, is that the line is often offered as a substitute

https://www.troyhunt.com/court-injunctions-are-the-thoughts-and-prayers-of-data-


Weekly Update 472

06:23 - 06/10/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

This probably comes through pretty strongly in this week's video, but I love the vibe at CERN. It's a place so focused on the common good of science that all the other cultural attributes that often put people at odds these days fade into the distance.

https://www.troyhunt.com/weekly-update-472/



Weekly Update 471

06:50 - 27/09/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

I'm so happy to finally be getting those HIBP demos out! The first couple are simple, but as I say in this week's vid, it's the simple questions we're still dealing with. As if to taunt me (or prove my point), we

https://www.troyhunt.com/weekly-update-471/


HIBP Demo: Querying the API, and the Free Test Key!

23:24 - 23/09/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

One of the most common use cases for HIBP's API is querying by email address, and we support hundreds of millions of searches against this endpoint every month. Loads of organisations use this service to understand the exposure of their customers and provide them with better protection against

https://www.troyhunt.com/hibp-demo-querying-the-api-and-the-free-test-key/


Weekly Update 470

08:35 - 21/09/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

Imagine jumping on board a class action after your precious datas have been breached, then sticking through it all the way until a settlement is reached. Then, finally, after a long and arduous battle, cashing in and getting... $1. Well, kinda $1, the ParkMobile class action granted up to $1

https://www.troyhunt.com/weekly-update-470/


Have I Been Pwned Demos Are Now Live!

05:49 - 19/09/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

Well, one of them is, but what's important is that we now have a platform on which we can start pushing out a lot more. It's not that HIBP is a particularly complex system that needs explaining in any depth, but we still get a lot

https://www.troyhunt.com/have-i-been-pwned-demos-are-now-live/


Weekly Update 469

07:42 - 13/09/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

So I had this idea around training a text-to-speech engine with my voice, then using that to speak over the Sonos at home to announce AI-driven events, such as people ringing the doorbell. A few hours' worth of video from these weekly updates fed into ElevenLabs and wammo! Here

https://www.troyhunt.com/weekly-update-469/


Weekly Update 468

08:08 - 07/09/2025
  View item as page

Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device.

I only just realised, as I prepared this accompanying blog post, that I didn't talk about one of the points in the overview: food. One of my fondest memories as a child living in Singapore and now as an adult visiting there is the food. It's

https://www.troyhunt.com/weekly-update-468/


Bruce Schneier

Upcoming Speaking Engagements

16:01 - 14/10/2025
  View item as page

This is a current list of where and when I am scheduled to speak:

  • I and Nathan E. Sanders will be giving a book talk on Rewiring Democracy at the Harvard Kennedy School’s Ash Center in Cambridge, Massachusetts, USA, on October 22, 2025 at noon ET.
  • I and Nathan E. Sanders will be speaking and signing books at the Cambridge Public Library in Cambridge, Massachusetts, USA, on October 22, 2025 at 6:00 PM ET. The event is sponsored by Harvard Bookstore.
  • I and Nathan E. Sanders will give a virtual talk about our book Rewiring Democracy on October 23, 2025 at 1:00 PM ET. The event is hosted by Data & Society...

https://www.schneier.com/blog/archives/2025/10/upcoming-speaking-engagements-49.


The Trump Administration’s Increased Use of Social Media Surveillance

11:09 - 14/10/2025
  View item as page

This chilling paragraph is in a comprehensive Brookings report about the use of tech to deport people from the US:

The administration has also adapted its methods of social media surveillance. Though agencies like the State Department have gathered millions of handles and monitored political discussions online, the Trump administration has been more explicit in who it’s targeting. Secretary of State Marco Rubio announced a new, zero-tolerance “Catch and Revoke” strategy, which uses AI to monitor the public speech of foreign nationals and revoke visas...

https://www.schneier.com/blog/archives/2025/10/the-trump-administrations-increas


Rewiring Democracy is Coming Soon

16:36 - 13/10/2025
  View item as page

My latest book, Rewiring Democracy: How AI Will Transform Our Politics, Government, and Citizenship, will be published in just over a week. No reviews yet, but you can read chapters 12 and 34 (of 43 chapters total).

You can order the book pretty much everywhere, and a copy signed by me here.

Please help spread the word. I want this book to make a splash when it’s public. Leave a review on whatever site you buy it from. Or make a TikTok video. Or do whatever you kids do these days. Is anyone a Slashdot contributor? I’d like the book to be announced there...

https://www.schneier.com/blog/archives/2025/10/rewiring-democracy-is-coming-soon


AI and the Future of American Politics

11:04 - 13/10/2025
  View item as page

Two years ago, Americans anxious about the forthcoming 2024 presidential election were considering the malevolent force of an election influencer: artificial intelligence. Over the past several years, we have seen plenty of warning signs from elections worldwide demonstrating how AI can be used to propagate misinformation and alter the political landscape, whether by trolls on social media, foreign influencers, or even a street magician. AI is poised to play a more volatile role than ever before in America’s next federal election in 2026. We can already see how different groups of political actors are approaching AI. Professional campaigners are using AI to accelerate the traditional tactics of electioneering; organizers are using it to reinvent how movements are built; and citizens are using it both to express themselves and amplify their side’s messaging. Because there are so few rules, and so little prospect of regulatory action, around AI’s role in politics, there is no oversight of these activities, and no safeguards against the dramatic potential impacts for our democracy...

https://www.schneier.com/blog/archives/2025/10/ai-and-the-future-of-american-pol


Friday Squid Blogging: Sperm Whale Eating a Giant Squid

21:02 - 10/10/2025
  View item as page

Video.

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Blog moderation policy.

https://www.schneier.com/blog/archives/2025/10/friday-squid-blogging-sperm-whale


Autonomous AI Hacking and the Future of Cybersecurity

11:06 - 10/10/2025
  View item as page

AI agents are now hacking computers. They’re getting better at all phases of cyberattacks, faster than most of us expected. They can chain together different aspects of a cyber operation, and hack autonomously, at computer speeds and scale. This is going to change everything.

Over the summer, hackers proved the concept, industry institutionalized it, and criminals operationalized it. In June, AI company XBOW took the top spot on HackerOne’s US leaderboard after submitting over 1,000 new vulnerabilities in just a few months. In August, the seven teams competing in DARPA’s AI Cyber Challenge ...

https://www.schneier.com/blog/archives/2025/10/autonomous-ai-hacking-and-the-fut


Flok License Plate Surveillance

16:10 - 08/10/2025
  View item as page

The company Flok is surveilling us as we drive:

A retired veteran named Lee Schmidt wanted to know how often Norfolk, Virginia’s 176 Flock Safety automated license-plate-reader cameras were tracking him. The answer, according to a U.S. District Court lawsuit filed in September, was more than four times a day, or 526 times from mid-February to early July. No, there’s no warrant out for Schmidt’s arrest, nor is there a warrant for Schmidt’s co-plaintiff, Crystal Arrington, whom the system tagged 849 times in roughly the same period.

You might think this sounds like it violates the Fourth Amendment, which protects American citizens from unreasonable searches and seizures without probable cause. Well, so does the American Civil Liberties Union. Norfolk, Virginia Judge Jamilah LeCruise also agrees, and in 2024 she ruled that plate-reader data obtained without a search warrant couldn’t be used against a defendant in a robbery case...

https://www.schneier.com/blog/archives/2025/10/flok-license-plate-surveillance.h


AI-Enabled Influence Operation Against Iran

11:04 - 07/10/2025
  View item as page

Citizen Lab has uncovered a coordinated AI-enabled influence operation against the Iranian government, probably conducted by Israel.

Key Findings

  • A coordinated network of more than 50 inauthentic X profiles is conducting an AI-enabled influence operation. The network, which we refer to as “PRISONBREAK,” is spreading narratives inciting Iranian audiences to revolt against the Islamic Republic of Iran.
  • While the network was created in 2023, almost all of its activity was conducted starting in January 2025, and continues to the present day.
  • The profiles’ activity appears to have been synchronized, at least in part, with the military campaign that the Israel Defense Forces conducted against Iranian targets in June 2025. ...

https://www.schneier.com/blog/archives/2025/10/ai-enabled-influence-operation-ag


AI in the 2026 Midterm Elections

11:06 - 06/10/2025
  View item as page

We are nearly one year out from the 2026 midterm elections, and it’s far too early to predict the outcomes. But it’s a safe bet that artificial intelligence technologies will once again be a major storyline.

The widespread fear that AI would be used to manipulate the 2024 US election seems rather quaint in a year where the president posts AI-generated images of himself as the pope on official White House accounts. But AI is a lot more than an information manipulator. It’s also emerging as a politicized issue. Political first-movers are adopting the technology, and that’s opening a ...

https://www.schneier.com/blog/archives/2025/10/ai-in-the-2026-midterm-elections.



Security Affairs

Researchers warn of widespread RDP attacks by 100K-node botnet

18:20 - 14/10/2025
  View item as page
A botnet of 100K+ IPs from multiple countries is attacking U.S. RDP services in a campaign active since October 8. GreyNoise researchers uncovered a large-scale botnet that is targeting Remote Desktop Protocol (RDP) services in the United States starting on October 8. The company discovered the botnet after detecting an unusual spike in Brazilian IP […]

https://securityaffairs.com/183389/security/researchers-warn-of-widespread-rdp-a


Harvard University hit in Oracle EBS cyberattack, 1.3 TB of data leaked by Cl0p group

14:08 - 14/10/2025
  View item as page
Harvard University confirmed being targeted in the Oracle EBS campaign after the Cl0p ransomware group leaked 1.3 TB of data. Harvard University confirmed it was targeted in the Oracle E-Business Suite campaign after the Cl0p ransomware group listed it on its leak site. The cybercrime group claimed to have leaked 1.3 TB of data allegedly […]

https://securityaffairs.com/183379/security/harvard-university-hit-in-oracle-ebs


UK NCSC Reports 429 cyberattacks in a year, with nationally significant cases more than doubling

11:21 - 14/10/2025
  View item as page
The UK’s NCSC handled 429 cyberattacks from Sept 2024–Aug 2025, including 204 nationally significant cases, over double the previous year’s total. The UK’s National Cyber Security Centre (NCSC) reported a record surge in major cyberattacks, responding to 429 incidents from September 2024 to August 2025, including 204 deemed “nationally significant”, more than double the previous […]

https://securityaffairs.com/183372/security/uk-ncsc-reports-429-cyberattacks-in-


Unverified COTS hardware enables persistent attacks in small satellites via SpyChain

08:39 - 14/10/2025
  View item as page
SpyChain shows how unverified COTS hardware in small satellites can enable persistent, multi-component supply chain attacks using NASA’s NOS3 simulator. The rise of small satellites has transformed scientific, commercial, and defense operations. Using commercial off-the-shelf (COTS) parts makes them cheaper and faster to build but also introduces new, poorly understood security risks unique to space […]

https://securityaffairs.com/183303/hacking/unverified-cots-hardware-enables-pers


Oracle issued an emergency security update to fix new E-Business Suite flaw CVE-2025-61884

07:31 - 14/10/2025
  View item as page
Oracle issued an emergency security update to address a new E-Business Suite (EBS) vulnerability tracked as CVE-2025-61884. Oracle released an emergency patch to address an information disclosure flaw, tracked as CVE-2025-61884 (CVSS Score of 7.5), in E-Business Suite’s Runtime UI component (versions 12.2.3–12.2.14). “Oracle has just released Security Alert CVE-2025-61884. This vulnerability affects some deployments of Oracle E-Business […]

https://securityaffairs.com/183362/security/oracle-issued-an-emergency-security-


Customer payment data stolen in Unity Technologies’s SpeedTree website compromise

18:18 - 13/10/2025
  View item as page
Malicious code on Unity Technologies’s SpeedTree site skimmed sensitive data from hundreds of customers, the company confirmed. Video game software development firm Unity Technologies revealed that malicious code on its SpeedTree website skimmed sensitive information from hundreds of customers, impacting users who accessed the compromised site. The company discovered on August 26, 2025, the presence […]

https://securityaffairs.com/183349/data-breach/customer-payment-data-stolen-in-u


SimonMed Imaging discloses a data breach impacting over 1.2 million people

14:02 - 13/10/2025
  View item as page
Medusa ransomware hit SimonMed Imaging, stealing 200 GB of data and impacting over 1.2 million people in a major healthcare data breach. SimonMed Imaging suffered a ransomware attack by the Medusa group, which claimed to have stolen 200 GB of data. SimonMed Imaging is one of the largest outpatient medical imaging providers in the U.S., […]

https://securityaffairs.com/183342/uncategorized/simonmed-imaging-discloses-a-da


Microsoft revamps Internet Explorer Mode in Edge after August attacks

13:17 - 13/10/2025
  View item as page
Microsoft updated Edge’s Internet Explorer mode after August 2025 reports that attackers exploited it to access users’ devices without authorization. Microsoft updated Edge’s Internet Explorer mode after reports in August 2025 that threat actors exploited the backward compatibility feature to gain unauthorized device access. Microsoft Edge’s IE mode lets organizations run legacy Internet Explorer 11 […]

https://securityaffairs.com/183333/security/microsoft-revamps-internet-explorer-


Astaroth Trojan abuses GitHub to host configs and evade takedowns

10:08 - 13/10/2025
  View item as page
The Astaroth banking Trojan uses GitHub to host malware configs, evade C2 takedowns and stay active by pulling new settings from the platform. McAfee discovered a new Astaroth campaign using GitHub repositories to host malware configurations. This allows attackers to evade takedowns by pulling fresh configs from GitHub whenever C2 servers are shut down, ensuring […]

https://securityaffairs.com/183323/cyber-crime/astaroth-trojan-abuses-github-to-


Google, Mandiant expose malware and zero-day behind Oracle EBS extortion

08:35 - 13/10/2025
  View item as page
Google and Mandiant link Oracle EBS extortion emails to known July-patched flaws and a likely zero-day, CVE-2025-61882. Google Threat Intelligence and Mandiant analyzed the Oracle E-Business Suite extortion campaign, revealing the use of malware. Attackers exploited July-patched EBS flaws and likely a zero-day (CVE-2025-61882), sending extortion emails to company executives. In early October, Google Mandiant […]

https://securityaffairs.com/183306/hacking/google-mandiant-expose-malware-and-ze


news.sophos.com

Shift left, stay ahead: The case for early threat prevention

13:05 - 14/10/2025
  View item as page
"'Shift left’ is a very trendy concept over the past few years [in application security]. The weird thing is, prevention is seen as something that's kind of old school in endpoint security or security operations."

https://news.sophos.com/en-us/2025/10/14/prevention-first-approach-to-security-w


Cybersecurity Awareness Month: 10 tips to Stay Safe Online that anyone can use

13:00 - 13/10/2025
  View item as page
Use this short checklist as a launchpad: adopt the basics consistently, strengthen the controls that matter most, and build routines that keep those protections current and effective.

https://news.sophos.com/en-us/2025/10/13/cybersecurity-awareness-month-2025-10-t


WhatsApp Worm Targets Brazilian Banking Customers

16:14 - 10/10/2025
  View item as page
Counter Threat UnitTM (CTU) researchers are investigating multiple incidents in an ongoing campaign targeting users of the WhatsApp messaging platform. The campaign, which started on September 29, 2025, is focused on Brazil and seeks to trick users into executing a malicious file attached to a self-spreading message received from a previously infected WhatsApp web session. […]

https://news.sophos.com/en-us/2025/10/10/whatsapp-worm-targets-brazilian-banking


The State of Ransomware in Healthcare 2025

17:35 - 08/10/2025
  View item as page
292 IT and cybersecurity leaders reveal the ransomware realities for healthcare establishments today.

https://news.sophos.com/en-us/2025/10/08/the-state-of-ransomware-in-healthcare-2



Introducing Sophos Advisory Services

11:30 - 01/10/2025
  View item as page
See how your networks, systems, and employees stand up to simulated attacks before an adversary strikes.

https://news.sophos.com/en-us/2025/10/01/introducing-sophos-advisory-services/


Report: Addressing cybersecurity burnout in 2025

10:00 - 30/09/2025
  View item as page
The consequences of this burnout are far-reaching, affecting productivity, incident response times, and employee retention.

https://news.sophos.com/en-us/2025/09/30/report-addressing-cybersecurity-burnout


Is your SIEM still serving You? Why it might be time to rethink your security stack

08:19 - 30/09/2025
  View item as page
Security teams are under increasing pressure to detect and respond to threats in real time, especially as the median dwell time for ransomware attacks has dropped from weeks to a few days. Yet many organizations still rely on legacy Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) tools. These tools […]

https://news.sophos.com/en-us/2025/09/30/rethink-siem-xdr-mdr/