Aggregator
CVE-2025-27445 | rsjoomla RSFirewall Component up to 3.1.5 on Joomla path traversal (EUVD-2025-16991)
CVE-2025-27753 | rsjoomla RSMediaGallery Component up to 2.1.6 on Joomla sql injection (EUVD-2025-16990)
CVE-2023-49076 | Pimcore customer-data-framework up to 4.0.4 cross-site request forgery (EUVD-2023-53095)
CVE-2023-48329 | CodeBard Fast Custom Social Share by Plugin up to 1.1.1 on WordPress cross site scripting (EUVD-2023-52385)
El Dorado
You must login to view this content
INC
You must login to view this content
Akira
You must login to view this content
CVE-2024-30066 | Microsoft Windows up to Server 2022 23H2 Winlogon heap-based overflow (EUVD-2024-28003)
CVE-2024-30067 | Microsoft Windows up to Server 2022 23H2 Winlogon integer overflow (EUVD-2024-28004)
CVE-2024-30062 | Microsoft Windows Standards-Based Storage Management Service use after free (EUVD-2024-27999)
#Infosec2025: Threat Actors Weaponizing Hardware Devices to Exploit Fortified Environments
Finding Balance in US AI Regulation
Open source policy management: How Sonatype supports security at scale
As organizations rely more heavily on open source components, software composition analysis (SCA) has become essential for identifying risks. But visibility alone is not enough. What turns insight into action is effective policy management: the ability to define and enforce rules that govern how software is built.
The post Open source policy management: How Sonatype supports security at scale appeared first on Security Boulevard.
30% быстрее, 50% легче, 100% нужнее: что умеет PT NAD 12.3
Hackers Are Stealing Salesforce Data, Google Warns
By Christy Lynch This post summarizes the June 4, 2025 threat intelligence update from Google and offers additional recommendations from Reveal Security based on similar and recently observed attack patterns targeting SaaS applications and cloud infrastructure. Reveal Security monitors the overall cyber landscape for unique threats that can evade legacy detection methodologies. This UNC6040 campaign continues post-authentication, where many tools lose visibility. Our unique post-authentication approach adds a critical line of defense against this threat and other credential-based attack vectors. Summary of the Threat Google’s Threat Intelligence Team has identified an ongoing campaign by threat actor group UNC6040, in which attackers are stealing data from Salesforce and other SaaS applications. The attackers begin by socially engineering employees to steal credentials, then log into enterprise SaaS applications using residential proxy services to mask their location and blend in with legitimate traffic. Once authenticated, the attackers conduct manual reconnaissance to identify valuable data, such as customer records or support tickets, and then exfiltrate the data using legitimate application features. And the attackers don’t stop there. According to the report: “Following this initial data theft, UNC6040 was observed leveraging end-user credentials obtained through credential harvesting or vishing to move laterally through victim networks, accessing and exfiltrating data from other cloud platforms such as Okta and Microsoft 365.” In some cases, this stolen data is used in extortion attempts against the affected companies. Attack Flow According to Google’s report, the attack typically unfolds in the following stages: The attackers appear highly familiar with Salesforce’s user interface and data structures, enabling them to navigate and extract data efficiently while staying within the broader bounds of normal user behavior. Attribution and Targeting UNC6040 is a financially motivated group that Google has been tracking since 2023. This campaign does not rely on malware or exploits but instead uses legitimate credentials and authorized application behavior making detection particularly difficult. The attacks appear opportunistic rather than industry-specific. Organizations using Salesforce and other major SaaS platforms for customer service or case management are at heightened risk. Detection and Mitigation Challenges Several factors make these attacks difficult to detect: Google emphasizes that session monitoring, anomaly detection, and granular audit logs are critical to identifying these kinds of intrusions. Salesforce customers can review their security documentation here. How Reveal Security Helps Reveal Security provides visibility into post-authentication user activity across SaaS applications like Salesforce, enabling organizations to detect the exact kind of behavior seen in this campaign. By analyzing human and non-human identity behavior to learn what is typical, Reveal detects behavioral anomalies that suggest misuse and impersonation even when the attacker uses valid credentials and operates from approved locations. Reveal Security’s detection capabilities include: Post-authentication behavioral monitoring in SaaS and cloud is often the only way to distinguish attacker actions from those of legitimate users. To learn more about how Reveal Security can protect against threats targeting data in Salesforce and other SaaS platforms, visit https://www.reveal.security/.
The post Hackers Are Stealing Salesforce Data, Google Warns appeared first on RevealSecurity.
The post Hackers Are Stealing Salesforce Data, Google Warns appeared first on Security Boulevard.
特斯拉汽车销量在欧洲继续下滑
Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands
Crypto24
You must login to view this content
Introducing Enzoic for Active Directory 3.6
Better Active Directory security with Enzoic 3.6: Real-time password feedback. CrowdStrike SIEM integration. Clearer credential risk insights.
The post Introducing Enzoic for Active Directory 3.6 appeared first on Security Boulevard.