Category: Data Breaches

Your blog category

  • CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog

    CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting OSGeo GeoServer to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation in the wild.
    The vulnerability in question is CVE-2025-58360 (CVSS score: 8.2), an unauthenticated XML External Entity (XXE) flaw that affects all versions prior to

  • ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories

    ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories

    This week’s cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons, and even software updates people trust. Tech giants and governments are racing to plug new holes while arguing over privacy and control. And researchers keep uncovering just how much of our digital life is still wide open.
    The new Threatsday Bulletin

  • NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems

    NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems

    Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google Drive API for command-and-control (C2) purposes.
    According to a report from Elastic Security Labs, the malware shares code similarities with another implant codenamed FINALDRAFT (aka Squidoor) that employs Microsoft Graph API for C2. FINALDRAFT is attributed to a

  • Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

    Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

    Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under active exploitation in the wild.
    The vulnerability, rated high in severity, is being tracked under the Chromium issue tracker ID “466192044.” Unlike other disclosures, Google has opted to keep information about the CVE identifier, the affected component, and

  • Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution

    Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution

    Huntress is warning of a new actively exploited vulnerability in Gladinet’s CentreStack and Triofox products stemming from the use of hard-coded cryptographic keys that have affected nine organizations so far.
    “Threat actors can potentially abuse this as a way to access the web.config file, opening the door for deserialization and remote code execution,” security researcher Bryan Masters said.

  • React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors

    React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors

    React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to deliver cryptocurrency miners and an array of previously undocumented malware families, according to new findings from Huntress.
    This includes a Linux backdoor called PeerBlight, a reverse proxy tunnel named CowTunnel, and a Go-based

  • .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

    .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

    New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to achieve remote code execution.
    WatchTowr Labs, which has codenamed the “invalid cast vulnerability” SOAPwn, said the issue impacts Barracuda Service Center RMM, Ivanti Endpoint Manager (EPM), and Umbraco 8. But the number of affected vendors is likely to be

  • Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling

    Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling

    Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption (IDE) protocol specification that could expose a local attacker to serious risks.
    The flaws impact PCIe Base Specification Revision 5.0 and onwards in the protocol mechanism introduced by the IDE Engineering Change Notice (ECN), according to the PCI Special

  • Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days

    Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days

    Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that has been actively exploited in the wild.
    Of the 56 flaws, three are rated Critical, and 53 are rated Important in severity. Two other defects are listed as publicly known at the time of the release. These include 29 privilege escalation, 18 remote code

  • Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws

    Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws

    Fortinet, Ivanti, and SAP have moved to address critical security flaws in their products that, if successfully exploited, could result in an authentication bypass and code execution.
    The Fortinet vulnerabilities affect FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager and relate to a case of improper verification of a cryptographic signature. They are tracked as CVE-2025-59718 and