Aggregator
Microsoft Traces On-Premises SharePoint Exploits to China
Microsoft said an attack campaign targeting zero-day vulnerabilities in on-premises SharePoint servers appears to have begun by July 7, tied to three Chinese hack groups. With proof-of-concept exploit code now in the wild, security experts said hackers of all stripes have joined the fray.
UK Government Set to Impose Ransomware Payment Ban
The British government vowed Tuesday to proceed with a proposed ransomware payment ban for critical infrastructure organizations such as the National Health Service and to press forward on a mandate for other businesses to notify authorities in advance of paying out a ransom.
House Republicans endorse stricter state and federal-led voter roll purges despite dearth of evidence on fraud
GOP lawmakers say they’re committed to altering national voting laws to make it easier for states to purge potentially eligible voters.
The post House Republicans endorse stricter state and federal-led voter roll purges despite dearth of evidence on fraud appeared first on CyberScoop.
CVE-2025-51475 | transformeroptimus superagi 0.0.14 File Upload Endpoint os.path.join/get_root_input_dir path traversal
CVE-2025-51463 | AIM 3.28.0 Backup restore_run_backup path traversal
CVE-2025-51482 | letta 0.7.12 /v1/tools/run access control
CORNETO — Этот ИИ превращает хаос биоданных в точную карту болезни — и реальный шанс на лечение
Cisco confirms active exploitation of ISE and ISE-PIC flaws
CVE-2022-48983 | Linux Kernel up to 5.15.82/6.0.12 io_tctx_exit_cb null pointer dereference (f895511de9d2/d91edca19434/998b30c3948e / Nessus ID 213014)
CVE-2022-48976 | Linux Kernel up to 6.0.12 netfilter flow_offload_queue_work stack-based overflow (a220a11fda01/a81047154e7c / WID-SEC-2024-3251)
Windows 11 gets new Black Screen of Death, auto recovery tool
AI’s Double Edge: How AI Expands the Attack Surface & Empowers Defenders
Магнитный ад Юпитера родил монстра — волны, которых не должно быть
Akamai Identifies Coyote Malware Variant Capable of Compromising Microsoft UIA Framework
Akamai researchers today disclosed they have discovered a variant of Coyote malware that extracts specific banking and cryptocurrency exchanges by compromising the UI Automation (UIA) framework developed by Microsoft.
The post Akamai Identifies Coyote Malware Variant Capable of Compromising Microsoft UIA Framework appeared first on Security Boulevard.
New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords
A sophisticated phishing campaign targeting Web3 developers has emerged, exploiting the growing interest in artificial intelligence platforms to deliver credential-stealing malware. The threat actor LARVA-208, previously known for targeting IT staff through phone-based social engineering, has pivoted to focus on blockchain developers using a meticulously crafted fake AI workspace platform. The attack begins with seemingly […]
The post New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords appeared first on Cyber Security News.
INC
You must login to view this content