π¦
Inside the Active Threats of Ivantiβs Exploited Vulnerabilities π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Threats, exploitation, and mitigation of Ivantis two critical actively exploited vulnerabilitiesCVE20250282 and CVE20250283affecting its Connect Secure, Policy Secure, and Neurons for ZTA Gateways. Overview On January 8, 2025, Ivanti disclosed two critical vulnerabilitiesCVE20250282 and CVE20250283affecting its Connect Secure, Policy Secure, and Neurons for ZTA Gateways. These vulnerabilities expose enterprises to unauthenticated remote code execution RCE and privilege escalation risks. While Ivanti has released patches to address these issues, threat actor exploitation, particularly of CVE20250282, has prompted a global response. This blog aims to provide detailed insights into these vulnerabilities and their exploitation, offering valuable guidance for mitigating risks. A ...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
Ivanti Exploited: Inside Active Threats & Risks
All about Ivantiβs two critical exploited vulnerabilitiesβCVE-2025-0282 and CVE-2025-0283βaffecting its Connect Secure, Policy Secure, and Neurons for ZTA Gateways.
π Microsoft 365 MFA Outage Fixed π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Microsoft confirmed an outage of its multifactor authentication system impacting access to Microsoft 365, causing login failures and service disruption.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Microsoft 365 MFA Outage Fixed
Microsoft confirmed an outage of its multi-factor authentication system impacting access to Microsoft 365, causing login failures and service disruption
π1
π΅οΈββοΈ The Shifting Landscape of Open Source Security π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
By focusing on vigilant security practices, responsible AI deployment, and alignment with global regulatory standards, the OSS community can make 2025 a transformative year for security.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
The Shifting Landscape of Open Source Security
By focusing on vigilant security practices, responsible AI deployment, and alignment with global regulatory standards, the OSS community can make 2025 a transformative year for security.
ποΈ Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A recently disclosed critical security flaw impacting the Aviatrix Controller cloud networking platform has come under active exploitation in the wild to deploy backdoors and cryptocurrency miners. Cloud security firm Wiz said it's currently responding to "multiple incidents" involving the weaponization of CVE202450603 CVSS score 10.0, a maximum severity bug that could result in.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
β€1
π΅οΈββοΈ Cyberattackers Hide Infostealers in YouTube Comments, Google Search Results π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Threat actors are targeting people searching for pirated or cracked software with fake downloaders that include infostealing malware such as Lumma and Vidar.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Cyberattackers Hide Infostealers in YouTube Comments
Threat actors are targeting people searching for pirated or cracked software with fake downloaders that include infostealing malware such as Lumma and Vidar.
π΅οΈββοΈ Telefonica Breach Exposes Jira Tickets, Customer Data π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The Hellcat ransomware group has stolen roughly 5,000 documents, potentially containing confidential information, from the telecom giant's internal database.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Telefonica Breach Exposes Jira Tickets, Customer Data
The Hellcat ransomware group has stolen roughly 5,000 documents, potentially containing confidential information, from the telecom giant's internal database.
π§ How CTEM is providing better cybersecurity resilience for organizations π§
π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Organizations today continuously face a number of fastmoving cyber threats that regularly challenge the effectiveness of their cybersecurity defenses. However, to keep pace, businesses need a proactive and adaptive approach to their security planning and execution. Cyber threat exposure management CTEM is an effective way to achieve this goal. It provides organizations with a reliable The post How CTEM is providing better cybersecurity resilience for organizations appeared first on Security Intelligence.π Read more.
π Via "Security Intelligence"
----------
ποΈ Seen on @cibsecurity
Security Intelligence
How CTEM is providing better cybersecurity resilience for organizations
Cyber threat exposure management (CTEM) helps organizations identify, assess and mitigate new cyber risks in the face of ever-evolving challenges.
π Russian Malware Campaign Hits Central Asian Diplomatic Files π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Diplomatic entities in Kazakhstan and Central Asia have been targeted by UAC0063 using weaponized Word docs deploying HATVIBE malware.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Russian Malware Campaign Hits Central Asian Diplomatic Files
Diplomatic entities in Kazakhstan and Central Asia have been targeted by UAC-0063 using weaponized Word docs deploying HATVIBE malware
π΅οΈββοΈ Microsoft Cracks Down on Malicious Copilot AI Use π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
According to the tech giant, it has observed a threat group seeking out vulnerable customer accounts using generative AI, then creating tools to abuse these services.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Microsoft Cracks Down on Malicious Copilot AI Use
According to the tech giant, it has observed a threat group seeking out vulnerable customer accounts using generative AI, then creating tools to abuse these services.
π΅οΈββοΈ Cloud Attackers Exploit Max-Critical Aviatrix RCE Flaw π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The security vulnerability tracked as CVE202450603, which rates 10 out of 10 on the CVSS scale, enables unauthenticated remote code execution on affected systems, which cyberattackers are using to plant malware.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Cloud Attackers Exploit Max-Critical Aviatrix RCE Flaw
The security vulnerability tracked as CVE-2024-50603, which rates 10 out of 10 on the CVSS scale, enables unauthenticated remote code execution on affected systems, which cyberattackers are using to plant malware.
π¦Ώ US Chip Export Rule Proposes Limits to Thwart Chinese GPUs π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
The Biden administration states the rule will prevent U.S. chips from passing to China through countries loosely allied or not politically allied with the U.S.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
US Chip Export Rule Proposes Limits to Thwart Chinese GPUs
The rule will prevent U.S. chips from passing to China through countries loosely allied or not politically allied with the U.S.
ποΈ CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The U.S. Cybersecurity and Infrastructure Security Agency CISA on Monday added a second security flaw impacting BeyondTrust Privileged Remote Access PRA and Remote Support RS products to the Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation in the wild. The vulnerability in question is CVE202412686 CVSS score 6.6, a mediumseverity bug that could.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Critical Infrastructure Urged to Scrutinize Product Security During Procurement π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A joint government advisory has set out steps critical infrastructure firms should take to ensure any OT products they purchase are secure by design.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Critical Infrastructure Urged to Scrutinize Product Security During Procurement
A joint government advisory has set out steps critical infrastructure firms should take to ensure any OT products they purchase are secure by design
ποΈ Illicit HuiOne Telegram Market Surpasses Hydra, Hits $24 Billion in Crypto Transactions ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Telegrambased online marketplace known as HuiOne Guarantee and its vendors have cumulatively received at least 24 billion in cryptocurrency, dwarfing the nowdefunct Hydra to become the largest online illicit marketplace to have ever operated. The figures, released by blockchain analytics firm Elliptic, show that monthly inflows have increased by 51 since July 2024. Huione Guarantee, part.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Zero-Day Vulnerability Suspected in Attacks on Fortinet Firewalls with Exposed Interfaces ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Threat hunters are calling attention to a new campaign that has targeted Fortinet FortiGate firewall devices with management interfaces exposed on the public internet. "The campaign involved unauthorized administrative logins on management interfaces of firewalls, creation of new accounts, SSL VPN authentication through those accounts, and various other configuration changes," cybersecurity firm.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Remediation Times Drop Sharply as Cyber Hygiene Take Up Surges π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
CISA claims US critical infrastructure providers are improving cyber hygiene and remediation activities.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Remediation Times Drop Sharply as Cyber Hygiene Take Up Surges
CISA claims US critical infrastructure providers are improving cyber hygiene and remediation activities
π UK Registry Nominet Breached Via Ivanti Zero-Day π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The .uk registry Nominet has been breached by a recently disclosed zeroday vulnerability in Ivanti products.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
UK Registry Nominet Breached Via Ivanti Zero-Day
The .uk registry Nominet has been breached by a recently disclosed zero-day vulnerability in Ivanti products
π’ UK government officials consider banning ransomware payments π’
π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
Public bodies could be prevented from paying out to hackers to regain control of systems.π Read more.
π Via "ITPro"
----------
ποΈ Seen on @cibsecurity
IT Pro
UK government officials consider banning ransomware payments
Public bodies could be prevented from paying out to hackers to regain control of systems
π1
ποΈ 4 Reasons Your SaaS Attack Surface Can No Longer be Ignored ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
What do identity risks, data security risks and thirdparty risks all have in common? They are all made much worse by SaaS sprawl. Every new SaaS account adds a new identity to secure, a new place where sensitive data can end up, and a new source of third party risk. Learn how you can protect this sprawling attack surface in 2025. What do identity risks, data security risks and thirdparty.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Manchester Law Firm Leads 15,000 to Sue Google and Microsoft over AI Data π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Barings Law is planning to sue the two tech giants over numerous alleged violations of data misuse, including for AI training.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Manchester Law Firm Leads 15,000 to Sue Google and Microsoft over AI Data
Barings Law is planning to sue the two tech giants over numerous alleged violations of data misuse, including for AI training
π UK Considers Ban on Ransomware Payments by Public Bodies π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A UK government consultation has proposed banning public sector and critical infrastructure organizations from making ransomware payments to disincentivize attackers from targeting these services.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
UK Considers Ban on Ransomware Payments by Public Bodies
A UK government consultation has proposed banning public sector and critical infrastructure organizations from making ransomware payments to disincentivize attackers from targeting these services