Aggregator
CVE-2025-41719 | Sauter EY-modulo 5 ecos 5 ecos505 up to 3.1.x Webserver improper validation of syntactic correctness of input (vde-2025-060 / EUVD-2025-35337)
CVE-2025-11915 | Google Vertex AI 2025-09-27 request smuggling (gcp-2025-059 / EUVD-2025-35358)
Главы разведки на допросе. Дело о прослушке Paragon в эпицентре шпионажа за медиа-персонами
Veeam Buys Securiti AI for $1.725B to Unify Data Protection
Veeam's proposed acquisition of Securiti AI for $1.725 billion addresses a long-standing disconnect between where data runs and where it's protected. The move enhances AI governance and posture management while supporting Veeam's vision for end-to-end data control.
HHS Watchdog Flags Medicaid IT Security Gaps in Some States
Pen testing of 10 Medicaid management and enrollment systems found that while the nine states and one territory implemented "generally effective" security controls to prevent limited cyberattacks, improvements are needed to protect against more sophisticated attacks, said a watchdog agency report.
Russia's Coldriver Revamps Malware to Evade Detection
Russia-linked threat group COLDRIVER rapidly replaced its exposed malware with a stealthier PowerShell variant, using fake CAPTCHA prompts and cryptographic key-splitting to evade detection and escalate surveillance on NGOs, dissidents and policy experts, according to new research.
CISA Flags Highly Exploitable Windows SMB Flaw
A three-month old flaw in a network protocol for file sharing used by Microsoft is under active exploitation, warns the U.S. Cybersecurity and Infrastructure Security Agency. The flaw's exploitation bypasses mitigations Microsoft has built over the years to prevent NTLM reflection attacks.
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2025-61932 Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability
This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data
Cybercriminals are increasingly exploiting a legitimate Microsoft 365 feature designed for enterprise convenience, turning Exchange Online’s Direct Send into a dangerous vector for phishing campaigns and business email compromise attacks. Security researchers across the industry are sounding the alarm as malicious actors leverage this trusted pathway to bypass authentication checks and deliver convincing internal-looking messages […]
The post Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Bridging the Remediation Gap: Introducing Pentera Resolve
亚马逊云科技终结了体育界的所有「玄学」
JLR Hack UK's Costliest Ever, Hitting Economy with £1.9bn Loss
Как мы заставили ИИ работать на безопасность: 4 кейса из практики
Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys
Один сбой в SMB — и весь домен под контролем. Cрочно обновите Windows из-за нового бага
US ‘slipping’ on cybersecurity, annual Cyberspace Solarium Commission report concludes
The annual implementation report recommends reversing Trump administration budget cuts, empowering the national cyber director and other steps.
The post US ‘slipping’ on cybersecurity, annual Cyberspace Solarium Commission report concludes appeared first on CyberScoop.
Hackers Use ASP.NET Machine Keys to Break Into IIS, Push Malicious Extensions
In September 2025, Texas A&M University System (TAMUS) Cybersecurity, a managed detection and response provider, in collaboration with Elastic Security Labs, uncovered a sophisticated post-exploitation campaign by a Chinese-speaking threat actor. Using this method, the attackers installed a malicious IIS module named TOLLBOOTH, deployed a Godzilla-forked webshell framework, leveraged the GotoHTTP remote monitoring and management […]
The post Hackers Use ASP.NET Machine Keys to Break Into IIS, Push Malicious Extensions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
No Threats Left Behind: SOC Analyst’s Guide to Expert Triage
A SOC is where every second counts. Amidst a flood of alerts, false positives, and ever-short time, analysts face the daily challenge of identifying what truly matters — before attackers gain ground. That’s where alert triage comes in: the essential first step in detecting, prioritizing, and responding to threats efficiently. Done right, it defines the […]
The post No Threats Left Behind: SOC Analyst’s Guide to Expert Triage appeared first on ANY.RUN's Cybersecurity Blog.