Aggregator
CVE-2025-20270 | Cisco Evolved Programmable Network Manager API Endpoint information disclosure (cisco-sa-epnm-info-dis-zhPPMfgz / WID-SEC-2025-1957)
CVE-2025-20291 | Cisco Webex Meetings redirect (cisco-sa-webex-urlredirect-uK8dDJSZ / WID-SEC-2025-1960)
CVE-2025-9867 | Google Chrome up to 139.0.7258.154 on Android Downloads clickjacking (ID 415496 / WID-SEC-2025-1946)
CVE-2025-9865 | Google Chrome up to 139.0.7258.154 on Android Toolbar clickjacking (ID 437147 / WID-SEC-2025-1946)
CVE-2025-20335 | Cisco Session Initiation Protocol Software up to 14.3(1)SR1 Request access control (cisco-sa-phone-write-g3kcC5Df / WID-SEC-2025-1958)
Streameast, world’s largest pirated live sports network, shut down by Egyptian authorities
An antipiracy coalition of entertainment companies applauded the takedown. The network’s two operators were arrested at their residences in Egypt.
The post Streameast, world’s largest pirated live sports network, shut down by Egyptian authorities appeared first on CyberScoop.
Qilin
You must login to view this content
Qilin
You must login to view this content
Ensuring Compliance and feeling reassured in the Cloud
How Can Non-Human Identities (NHIs) Enhance Cloud Security? Is your organization leveraging the power of Non-Human Identities (NHIs) and Secrets Security Management to fortify cloud security? If not, you could be leaving yourself vulnerable to potential cyber threats. The management of NHIs and secrets can significantly reduce the risk of security breaches and data leaks, […]
The post Ensuring Compliance and feeling reassured in the Cloud appeared first on Entro.
The post Ensuring Compliance and feeling reassured in the Cloud appeared first on Security Boulevard.
Are Your NHIs Fully Protected from Cyber Threats?
Understanding the Significance of NHIs in Cybersecurity Why are Non-Human Identities (NHIs) so crucial in cybersecurity? These machine identities consist of Secrets (encrypted tokens, keys, or passwords) and permissions that are akin to a passport-visa system. NHIs and their Secrets traverse through your server ecosystem much like a tourist, requiring a well-constructed management system to […]
The post Are Your NHIs Fully Protected from Cyber Threats? appeared first on Entro.
The post Are Your NHIs Fully Protected from Cyber Threats? appeared first on Security Boulevard.
California Tax Refund Mobile Phish
A new round of mobile phish is imitating the State of California's "Franchise Tax Board" in a round of phishing sites that are gaining prominence in the past few days. I visited ftb.ca-gov-sg[.]top/notice from a burner phone to see how the scheme works (the page doesn't load from the Windows browsers I tested.)
After harvesting all of my private information, the site informs me that I had a $1050 refund available. The phish claims that "Bank Routing" is unavailable due to "system maintenance" and offers the option to send my refund via my Credit Card if I just provide the card number, expiration date, and CVV.
urlscan.io shows at least 300 domains have been observed, all using a hostname pattern that starts with "ftb.cagov" or "ftb.ca-gov" following by some random characters and using TLDs ".cfd" or ".cc"
Most of the observed domains were registered at Dominet (HK) Limited, and likely all are hosted at TENCENT, though most are having their location protected by the reverse proxy service at CloudFlare. (All of the non-CloudFlare ones are on TenCent).
Some recent example hostnames are:
- ftb.cagov-ac[.]cfd
- ftb.cagov-bd[.]cfd
- ftb.cagov-ch[.]cfd
- ftb.ca-gov-ci[.]cfd
- ftb.cagov-ckt[.]cc
- ftb.cagov-ga[.]cc
- ftb.ca-gov-gd[.]cfd
- ftb.cagov-gi[.]cc
- ftb.cagov-go[.]cc
- ftb.cagov-idr[.]cc
- ftb.cagov-nb[.]cfd
- ftb.cagov-ork[.]cc
- ftb.ca-gov-pf[.]cfd
- ftb.cagov-rld[.]cc
- ftb.cagov-tes[.]cc
- ftb.cagov-tuf[.]cc
- ftb.cagov-tug[.]cc
- ftb.cagov-tum[.]cc
- ftb.cagov-vkd[.]cc
- ftb.cagov-whe[.]cc
- ftb.cagov-wht[.]cc
- ftb.cagov-whu[.]cc
- ftb.cagov-why[.]cc
- ftb.ca-gov-yg[.]cfd
- ftb.cagov-ytk[.]cc
There have been 190 domains observed by URLScan that included the pattern "*.cagov-xx.cc" with the first round imitating California's DMV from June 23rd to June 25th. The "FTB" pattern began August 19th with ftb.cagov-ge[.]cc/notice and continuing with 143 more reported domains, including 32 domains reported today. The "cagov-XX.cfd" pattern began on August 31st and has been seen using 31 domains. "ca-gov-XX.cfd" also began August 31st and has used 58 domains so far, all hosted at TENCENT.
Searching by IP address using ZETAlytics ZoneCruncher, we find at least 105 domains hosted on four TenCent IP addresses:
41 domains hosted on 170.106.140[.]181
38 domains hosted on 43.153.19[.]10
14 domains hosted on 49.51.188[.]94
12 domains hosted on 43.130.56[.]94
The post California Tax Refund Mobile Phish appeared first on Security Boulevard.
Russia's APT28 Targets Microsoft Outlook With 'NotDoor' Malware
Cloudflare Holds Back the Tide on 11.5Tbps DDoS Attack
Cato Networks acquires AI security startup Aim Security
Cato's move comes as the company also extended its Series G funding round with an additional $50 million from Acrew Capital.
The post Cato Networks acquires AI security startup Aim Security appeared first on CyberScoop.
Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers
Crooks turn HexStrike AI into a weapon for fresh vulnerabilities
CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory warning about a critical vulnerability in SunPower PVS6 solar power devices that could allow attackers to gain complete control over the systems. The flaw, tracked as CVE-2025-9696, stems from the use of hardcoded credentials in the device’s BluetoothLE interface, presenting a significant threat […]
The post CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access appeared first on Cyber Security News.
Why Misconceptions About Cloud Managed Services Can Cost You
Scaling Kubernetes isn’t just about launching containers—it’s about choosing support models that truly let developers innovate instead of drowning in operational noise. Recently, I read Kathie Clark’s excellent blog, “What I Got Wrong About Cloud Managed Services (And Why It Matters).” It got me thinking about my own experience working inside the Kubernetes ecosystems and the broader cloud-native community. Over the past several years, Fairwinds has refined our Managed Kubernetes-as-a-Service and professional services to ensure we provide valuable services in the Kubernetes ecosystem as it evolves and expands.
The post Why Misconceptions About Cloud Managed Services Can Cost You appeared first on Security Boulevard.