In this blog entry, we discuss how North Korea's significant role in cybercrime – including campaigns attributed to Void Dokkaebi – is facilitated by extensive use of anonymization networks and the use of Russian IP ranges.
GreyNoise observed a 9X spike in suspicious scanning activity targeting Ivanti Connect Secure or Ivanti Pulse Secure VPN systems. More than 230 unique IPs probed ICS/IPS endpoints. This surge may indicate coordinated reconnaissance and possible preparation for future exploitation.
Attackers from every corner of the internet are exploiting a uniquely dangerous class of cyber flaws: resurgent vulnerabilities. GreyNoise’s latest research breaks down these vulnerabilities — how they behave, why they’re dangerous, and what defenders and policymakers need to know to stay ahead.
A vulnerability classified as problematic was found in SQLiteManager 1.2.4. This vulnerability affects unknown code of the file main.php. The manipulation of the argument nsextt leads to cross site scripting.
This vulnerability was named CVE-2012-5105. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Moodle. It has been rated as problematic. This issue affects some unknown processing of the component mod_data Module. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2025-3637. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Moodle. It has been declared as critical. This vulnerability affects unknown code of the component RSS Block. The manipulation leads to improper authorization.
This vulnerability was named CVE-2025-3636. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in Moodle. It has been classified as problematic. This affects an unknown part of the component User Tours Manager. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2025-3635. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Moodle and classified as critical. Affected by this issue is some unknown functionality of the component MFA. The manipulation leads to improper authorization.
This vulnerability is handled as CVE-2025-3634. The attack can only be done within the local network. There is no exploit available.
A vulnerability has been found in Moodle and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Assignment Submission Search. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2025-3628. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Moodle. Affected is an unknown function of the component Multi-Factor Authentication. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2025-3627. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Moodle. This issue affects some unknown processing of the component MFA Email Factor Revoke Action. The manipulation leads to improper control of resource identifiers.
The identification of this vulnerability is CVE-2025-3625. Access to the local network is required for this attack. There is no exploit available.
A vulnerability classified as problematic was found in UiCore Elements Plugin up to 1.0.16 on WordPress. This vulnerability affects unknown code of the component Widget. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-1054. The attack can be initiated remotely. There is no exploit available.