Aggregator
'PDNS for Schools' to provide cyber resilience for more institutions
"Winning trust, and making powerful connections"
"What's happened to my data?"
CVE-2024-13870 | Bitdefender Box up to 1.3.52.928 security version number mutable to older versions
CISA Warns of Exploitable Fast FAT Vulnerability in Microsoft Windows
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding a critical vulnerability in the Microsoft Windows Fast FAT File System Driver. This vulnerability, identified as CVE-2025-24985, poses a significant threat as it involves an integer overflow or wraparound issue, which could allow unauthorized attackers to execute harmful code on affected systems. The […]
The post CISA Warns of Exploitable Fast FAT Vulnerability in Microsoft Windows appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-1527 | devitemsllc ShopLentor Plugin up to 3.1.0 on WordPress Flash Sale Countdown Module cross site scripting
CVE-2024-13871 | Bitdefender Box 1.3.11.490 API Endpoint check_image_and_trigger_recovery API command injection
CVE-2024-13872 | Bitdefender Box prior 1.3.11.505 HTTP Protocol /set_temp_token cleartext transmission
CISA and Partners Release Cybersecurity Advisory on Medusa Ransomware
Today, CISA—in partnership with the Federal Bureau of Investigation (FBI) and Multi-State Information Sharing and Analysis Center (MS-ISAC)—released joint Cybersecurity Advisory, #StopRansomware: Medusa Ransomware. This advisory provides tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and detection methods associated with known Medusa ransomware activity.
Medusa is a ransomware-as-a-service variant used to conduct ransomware attacks; as of December 2024, over 300 victims from critical infrastructure sectors have been impacted. Medusa actors use common techniques like phishing campaigns and exploiting unpatched software vulnerabilities.
Immediate actions organizations can take to mitigate Medusa ransomware activity:
- Ensure operating systems, software, and firmware are patched and up to date.
- Segment networks to restrict lateral movement.
- Filter network traffic by preventing unknown or untrusted origins from accessing remote services.
CISA encourages network defenders to review the advisory and implement the recommended mitigations to reduce the likelihood and impact of Medusa ransomware incidents. See #StopRansomware and the #StopRansomware Guide for additional guidance on ransomware protection, detection, and response.
RansomHub
Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack
Defensie neemt nieuwe 81mm-mortieren in gebruik (video)
NIST selects HQC as backup algorithm for post-quantum encryption
Last year, NIST standardized a set of encryption algorithms that can keep data secure from a cyberattack by a future quantum computer. Now, NIST has selected a backup algorithm that can provide a second line of defense for the task of general encryption, which safeguards internet traffic and stored data alike. Encryption protects sensitive electronic information, including internet traffic and medical and financial records, as well as corporate and national security secrets. But a sufficiently … More →
The post NIST selects HQC as backup algorithm for post-quantum encryption appeared first on Help Net Security.