Wednesday, March 19, 2025

Vulnerability

Hackers Exploit Cobalt Strike, SQLMap, and Other Tools to Target Web Applications

A recent cybersecurity incident has highlighted the sophisticated methods used by hackers to target web applications, particularly in South Korea.The attackers leveraged a combination of tools, including Cobalt...

Severe AMI BMC Vulnerability Enables Remote Authentication Bypass by Attackers

A critical vulnerability has been discovered in AMI's MegaRAC software, which is used in Baseboard Management Controllers (BMCs) across various server hardware.This vulnerability,...

CISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm over a critical supply-chain attack affecting a widely used third-party GitHub Action: tj-actions/changed-files.This...

11 State-Sponsored Threat Actors Exploit 8-Year-Old Windows Shortcut Flaw

Cybersecurity researchers have discovered that multiple state-sponsored threat actors have been exploiting an eight-year-old vulnerability in Windows shortcut files.This security flaw, identified as ZDI-CAN-25373,...

Critical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A critical vulnerability affecting Synology's DiskStation Manager (DSM) has been disclosed, allowing remote attackers to execute arbitrary code on vulnerable systems.This severe issue, identified...

Windows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC Released

A critical vulnerability in Windows File Explorer has been discovered, allowing attackers to capture NTLM hashes and potentially exploit them for network spoofing attacks.The...

CISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit

The Cybersecurity and Infrastructure Security Agency (CISA) issued a critical security warning regarding a severe vulnerability in Fortinet's FortiOS and FortiProxy systems.Specifically, CVE-2025-24472, an...

Electromagnetic Side-Channel Analysis of Cryptographically Secured Devices

Electromagnetic (EM) side-channel analysis has emerged as a significant threat to cryptographically secured devices, particularly in the era of the Internet of Things (IoT)....

Hackers Exploit SSRF Vulnerability to Attack OpenAI’s ChatGPT Infrastructure

A critical cybersecurity alert has been issued following the active exploitation of a Server-Side Request Forgery (SSRF) vulnerability in OpenAI's ChatGPT infrastructure.According to the...

Google Launches Open-Source OSV-Scanner for Detecting Security Vulnerabilities

Google has announced the launch of OSV-Scanner V2, an open-source tool designed to enhance vulnerability scanning and remediation across various software ecosystems.This update follows the...

Kentico Xperience CMS Vulnerability Enables Remote Code Execution

In recent security research, vulnerabilities in the Kentico Xperience CMS have come to light, highlighting significant risks for users who rely on this Content...