1
0
1
0
1
0
1
0
0
1
1
0
1
0
VulnHub

AI-Powered Cybersecurity Intelligence

Latest Intelligence

The Hacker News
Simple Steps for Attack Surface Reduction

Cybersecurity leaders must implement effective settings from the outset to prevent attacks. Key strategies include adopting default policies such as deny-by-default, enforcing multi-factor authentication (MFA), and utilizing application Ringfencing ™ to mitigate risks. Read Original »


Impact: Not specified

Remediation: Disable Office macros, block outbound server access

Added:

SecurityWeek
Passkey Login Bypassed via WebAuthn Process Manipulation

Researchers from SquareX have demonstrated a method for attackers to impersonate users and bypass passkey security through manipulation of the WebAuthn process. This raises concerns about the effectiveness of current passkey authentication methods. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

The Hacker News
Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses

Google is enforcing a new policy that mandates cryptocurrency exchange and wallet developers to secure government licenses before their apps can be published in 15 specific regions. This move aims to create a safer and more compliant environment for users amidst rising concerns over cryptocurrency scams, highlighted by recent warnings from the FBI regarding significant financial losses. Read Original »


Impact: Cryptocurrency exchanges and wallets

Remediation: Obtain government licenses

Google

Added:

The Hacker News
CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog

CISA has added two security vulnerabilities affecting N-able N-central to its Known Exploited Vulnerabilities catalog due to evidence of active exploitation. N-able N-central is a platform used by Managed Service Providers for remote monitoring and management. Read Original »


Impact: N-able N-central

Remediation: Not specified

Added:

darkreading
North Korea Attacks South Koreans With Ransomware

North Korean hackers are employing a variety of malware types, including stealers, backdoors, and ransomware, in their attacks against South Koreans. This approach indicates a broad and aggressive strategy to exploit vulnerabilities. Read Original »


Impact: Not specified

Remediation: Not specified

RansomwareExploit

Added:

darkreading
Fortinet Products Are in the Crosshairs Again

Fortinet has disclosed a critical vulnerability in its FortiSIEM product, coinciding with warnings from researchers about an increase in malicious traffic targeting Fortinet's SSL VPNs. This situation highlights ongoing security concerns for the company's products. Read Original »


Impact: FortiSIEM, SSL VPNs

Remediation: Not specified

FortinetExploitVulnerability

Added:

darkreading
Whispers of XZ Utils Backdoor Live on in Old Docker Images

The article discusses the decision by developers to retain certain artifacts in old Docker images related to the XZ Utils backdoor, which they deemed unlikely to be exploited. This choice reflects a desire to preserve these artifacts as a historical curiosity despite the potential risks involved. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

SecurityWeek
Norwegian Police Say Pro-Russian Hackers Were Likely Behind Suspected Sabotage at a Dam

Norwegian police have indicated that pro-Russian hackers were likely responsible for a cyberattack on a dam, where they accessed a digital system controlling a valve and increased water flow. This incident raises concerns about the security of critical infrastructure against cyber threats. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

darkreading
Popular AI Systems Still a Work-in-Progress for Security

The analysis by Forescout highlights that open-source AI models are performing poorly in vulnerability research compared to their commercial and underground counterparts. This indicates that while AI systems are popular, they still have significant gaps in security capabilities. Read Original »


Impact: Not specified

Remediation: Not specified

Vulnerability

Added:

darkreading
Patch Now: Attackers Target OT Networks via Critical RCE Flaw

Researchers have identified exploitation attempts targeting a critical vulnerability with a CVSS score of 10 in an Erlang-based platform used for operational technology (OT) and critical infrastructure development. This poses a significant risk to systems relying on this platform. Read Original »


Impact: Not specified

Remediation: Patch Now

VulnerabilityPatch

Added:

The Hacker News
New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks

Researchers have identified a new malvertising campaign that deploys a multi-stage malware framework known as PS1Bot. This malware is modular and capable of various malicious activities, including information theft and keylogging. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

darkreading
What the LockBit 4.0 Leak Reveals About RaaS Groups

The LockBit 4.0 leak highlights the critical need for preparedness in cybersecurity defenses. Organizations that fail to prepare face increased uncertainty due to the lack of accountability from attackers. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

darkreading
How an AI-Based 'Pen Tester' Became a Top Bug Hunter on HackerOne

The article discusses how an AI-based penetration testing tool achieved a significant milestone by becoming the first non-human member to top the US leaderboard on HackerOne. This highlights the growing role of AI in cybersecurity, particularly in identifying vulnerabilities. Read Original »


Impact: Not specified

Remediation: Not specified

Added:

The Hacker News
Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws

Zoom and Xerox have released critical security updates to address vulnerabilities that could lead to privilege escalation and remote code execution. The flaw in Zoom Clients for Windows, identified as CVE-2025-49457, has a high severity score of 9.6 due to an untrusted search path issue. Read Original »


Impact: Zoom Clients for Windows, FreeFlow Core

Remediation: Apply the latest security updates from Zoom and Xerox.

WindowsCVEVulnerability

Added:

SecurityWeek
Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia

Intel, AMD, and Nvidia have released security advisories addressing recently discovered vulnerabilities in their products. This highlights ongoing security concerns within the chipmaking industry. Read Original »


Impact: Intel, AMD, Nvidia

Remediation: Not specified

Patch

Added: