Ivanti customers are confronting another string of attacks linked to an actively exploited vulnerability in the company’s VPN products. Mandiant said a nation-state backed espionage group linked to China has been exploiting the critical vulnerability, CVE-2025-22457, since mid-March. The threat group, which Google Threat Intelligence Group tracks as UNC5221, has a knack for exploiting Ivanti…
Category: vulnerability
AI, Artificial Intelligence, ChatGPT, Global Security News, Google, Google Chrome, Grok, malware, openai, password manager, Podcast, Security threats, The AI Fix, vulnerability
The AI Fix #44: AI-generated malware, and a stunning AI breakthrough
In episode 44 of The AI Fix, ChatGPT won’t build a crystal meth lab, GPT-4o improves the show’s podcast art, some students manage to screw in a lightbulb, Google releases Gemini 2.5 Pro Experimental and nobody notices, and Mark invents a clock for measuring AI time. Graham explains how ChatGPT’s love for Young Adult fiction…
CVE, Cybersecurity, Exploits, Global Security News, Next.js, open source, open source software, Research, vulnerability, vulnerability disclosure
Researchers raise alarm about critical Next.js vulnerability
Researchers warn that attackers could exploit a recently discovered critical vulnerability in the open-source JavaScript framework Next.js to bypass authorization in middleware and gain access to targeted systems. Vercel, the San Francisco-based company that created and maintains Next.js, released a patch for CVE-2025-29927 in Next.js 15.2.3 on March 18 and published a security advisory on…
Cybersecurity, Global IT News, Global Security News, Security, ServiceNow, vulnerability
Hackers are ramping up attacks using year-old ServiceNow security bugs to target unpatched systems
Threat intelligence startup GreyNoise says it has observed a ‘notable resurgence’ in attack activity © 2024 TechCrunch. All rights reserved. For personal use only.
APT37, APT43, china, Cybercrime, Cybersecurity, Evil Corp, Exploits, Global Security News, Government, India, Iran, Microsoft, microsoft windows, nation state threats, nation-state hackers, North Korea, pakistan, Ransomware, Research, Russia, Stanford University, Threats, trend micro, vulnerability, Windows, Zero Day Initiative, zero days
Nation-state groups hit hundreds of organizations with Microsoft Windows zero-day
Cybercriminals working on behalf of at least six nation-states are actively exploiting a zero-day vulnerability in Microsoft Windows to commit espionage, steal data and cryptocurrency, according to Trend Micro researchers. The vulnerability, which Trend Micro tracks as ZDI-CAN-25373, allows attackers to execute hidden malicious commands due to the way Windows displays the contents of shortcut…
cyberattacks, Cybersecurity, exploit, Exploits, Global Security News, Security Bloggers Network, Threats, vulnerability, zero day
Application Detection and Response Analysis: Why ADR? How ADR Works, and ADR Benefits
Two highly respected technology analysts from different cybersecurity disciplines are coming together to recommend that companies consider Application Detection and Response. Organizations face a constant barrage of cyber threats, including zero-day vulnerabilities that can exploit unknown weaknesses in software. Traditional security solutions often fall short in detecting and responding to these attacks, leaving organizations vulnerable.…
Cybersecurity, Fortinet, Global IT News, Global Security News, Ransomware, Security, vulnerability
Hackers are exploiting Fortinet firewall bugs to plant ransomware
Security researchers say that a threat actor it calls Mora_001 has ‘close ties’ to the Russia-linked hacking group © 2024 TechCrunch. All rights reserved. For personal use only.
bluetooth, chip, cyber security, esp32, Exploits, Global Security News, Hardware, internet of things, IoT Security, microcontroller, Mobile Security, Mobility, Research, Security, supply chain, tarlogic, vulnerability, wifi
Billions of Devices at Risk of Hacking & Impersonation Due to Hidden Commands
Researchers warn these commands could be exploited to manipulate memory, impersonate devices, and bypass security controls.
AI, Global IT News, Global Security News, In Brief, Research, vulnerability
AI models trained on unsecured code become toxic, study finds
A group of AI researchers has discovered a curious — and troubling — phenomenon: Models say some pretty toxic stuff after being fine-tuned on unsecured code. In a recently published paper, the group explained that training models, including OpenAI’s GPT-4o and Alibaba’s Qwen2.5-Coder-32B-Instruct, on code that contains vulnerabilities leads the models to give dangerous advice,…
Android, Global Security News, Guest blog, malware, Spyware, stalkerware, vulnerability
Flaw found in stalkerware apps, exposing millions of people. Here’s how to find out if your phone is being spied upon
A serious security vulnerability has been found in popular stalkerware apps, exposing the sensitive personal information and communications of millions of people. Read more in my article on the Hot for Security blog.
Cybersecurity, Exploits, firewall, Global Security News, Palo Alto, Security, vulnerability
Palo Alto Networks warns of another firewall vulnerability under attack by hackers
The US cybersecurity giant says hackers are exploiting the high-severity flaw to break into unpatched customer networks. © 2024 TechCrunch. All rights reserved. For personal use only.
Cybercrime, Cybersecurity, Darktrace, edge devices, Exploits, Fortinet, Global Security News, ivanti, Palo Alto Networks, Research, Threats, vulnerabilities, vulnerability
Edge device vulnerabilities fueled attack sprees in 2024
Edge devices harboring zero-day and n-day vulnerabilities were linked to the most consequential attack campaigns last year, Darktrace said in an annual threat report released Wednesday. Darktrace’s threat researchers found the most frequent vulnerability exploits in customers’ instances of Ivanti Connect Secure and Ivanti Policy Secure appliances, along with firewall products from Fortinet and Palo…
critical infrastructure, Global Security News, Guest blog, Security threats, vulnerability
US Coast Guard told to improve its cybersecurity, after warning raised that hacked ports could cost $2 billion per day
The US Coast Guard has been urged to improve the cybersecurity infrastructure of the Maritime Transportation System (MTS), which includes ports, waterways, and vessels essential for transporting over $5.4 trillion worth of goods annually. Read more in my article on the Tripwire State of Security blog.
Cybersecurity, Global IT News, Global Security News, hacking, Security, vulnerability, zero day, zyxel
Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers
The Taiwanese hardware maker says it has no plans patch the flaws impacting legacy router models © 2024 TechCrunch. All rights reserved. For personal use only.
API security, Application Detection and Response (ADR), Application Security, blocked attacks, cyberattacks, Cybersecurity, Global Security News, Log4Shell, Security Bloggers Network, threat detection, Threat Detection and Response, unsafe deserialization, vulnerability, Web Application Firewall (WAF)
Unsafe Deserialization Attacks Surge | December Attack Data | Contrast Security
Attacks on individual applications were down month to month in December 2024, but one of the most dangerous types of attacks was up significantly. That’s according to data Contrast Security publishes monthly about the detection and response of real-world application and application programming interface (API) attacks with Application Detection and Response (ADR). What you’re about…
Ads, bug bounty, bugs, Cybersecurity, Facebook, Global IT News, Global Security News, hacking, infosec, Meta, Security, security vulnerability, vulnerability
Facebook awards researcher $100,000 for finding bug that granted internal access
A security researcher found a bug in a Facebook ad platform, which gave him access to the company’s internal infrastructure. © 2024 TechCrunch. All rights reserved. For personal use only.
Cybersecurity, Exploits, Global Security News, hack, ivanti, Security, VPN, vulnerability
Hackers are exploiting a new Ivanti VPN security bug to hack into company networks
Mandiant says a Chinese cyberespionage group has been exploiting the critical-rated vulnerability since at least mid-December. © 2024 TechCrunch. All rights reserved. For personal use only.
CVE, Cybersecurity, Exploits, Global Security News, Security Bloggers Network, Security Research, vulnerability
2024 Recap: 8 Notable and Dangerous Chrome Vulnerabilities
With a market share of 66.68%, Google Chrome remains a prime target for cyberattacks. In 2024, this widely used browser faced numerous critical Chrome vulnerabilities that put businesses and individuals at risk and led to significant damage. Attackers exploited these flaws to bypass security measures, steal sensitive information, and deploy malicious payloads. Security managers are……
Conti, Exploits, Global Security News, Guest blog, malware, Ransomware, vulnerability
Mimic ransomware: what you need to know
What makes Mimic particularly unusual is that it exploits the API of a legitimate Windows file search tool (“Everything” by Voidtools) to quickly locate files for encryption. Find out more about the threat in my article on the Tripwire State of Security blog.
CCTV, DNA, Global Security News, Guest blog, Law & order, Podcast, Smashing Security, social media, Social networks, vulnerability
Smashing Security podcast #395: Gym hacking, disappearing DNA, and a social lockout
A Kansas City man is accused of hacking into local businesses, not to steal money, but to… get a cheaper gym membership? A DNA-testing firm has vanished, leaving customers in the dark about what’s happened to their sensitive genetic data. And Australia mulls a social media ban for youngsters. All this and much much more…