Aggregator
Emulating the Expedited Warlock Ransomware
AttackIQ has released a new attack graph that emulates the behaviors exhibited by Warlock ransomware, which emerged in June 2025. Beginning in July, Warlock operators have primarily targeted internet-exposed, unpatched on-premises Microsoft SharePoint servers, exploiting a set of recently disclosed zero-day vulnerabilities, specifically CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771, collectively referred to as the "ToolShell" exploit chain.
The post Emulating the Expedited Warlock Ransomware appeared first on AttackIQ.
The post Emulating the Expedited Warlock Ransomware appeared first on Security Boulevard.
蝉联入选!360多领域领跑2025网络安全创新方向报告
这届钓鱼邮件太“AI”装了
360护航天津医保双活容灾切换顺利完成
CISA紧急警告:Git代码执行漏洞正遭黑客利用
Global Salt Typhoon hacking campaigns linked to Chinese tech firms
All in One模式+云地一体架构全面赋能,360终端安全智能体引领行业变革
License-plate reader company pauses work with federal agencies after backlash
IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript
A stored cross-site scripting (XSS) flaw identified in IPFire 2.29’s web-based firewall interface (firewall.cgi). Tracked as CVE-2025-50975, the vulnerability allows any authenticated administrator to inject persistent JavaScript into firewall rule parameters. Once stored, the payload executes automatically when another administrator loads the rules page, potentially resulting in session hijacking, unauthorized actions within the interface, or […]
The post IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript appeared first on Cyber Security News.