VulnHub

AI-Powered Cybersecurity Intelligence

Last Update Check:

Latest Intelligence

SecurityWeek
Chinese Hackers Hit Drone Sector in Supply Chain Attacks

The China-linked hacking group Earth Ammit has conducted multi-wave supply chain attacks targeting the drone sector in Taiwan and South Korea. This disruption highlights the growing threat to critical technology sectors from state-sponsored cyber activities.


Impact: ["Drone sector"]

In the Wild: Yes

Age: Recently disclosed

Remediation: None available

Published:

SecurityWeek
Ransomware Groups, Chinese APTs Exploit Recent SAP NetWeaver Flaws

Two ransomware groups and several Chinese APTs are actively exploiting recent vulnerabilities in SAP NetWeaver, highlighting a significant security threat to organizations using this software. The exploitation of these flaws underscores the urgent need for companies to address such vulnerabilities to protect their systems.


Impact: ["SAP NetWeaver"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Apply patches

Ransomware Exploit

Published:

The Hacker News
5 BCDR Essentials for Effective Ransomware Defense

Ransomware has become a sophisticated threat that can severely damage organizations by exploiting legitimate IT tools for attacks. Microsoft has highlighted the misuse of its Quick Assist tool by cybercriminals to facilitate these destructive operations.


Impact: ["Quick Assist"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Implement security measures and monitor for unusual activity

Ransomware Microsoft Exploit

Published:

The Hacker News
Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

A Russia-linked cyber espionage group has exploited a zero-day vulnerability in MDaemon and other webmail servers through cross-site scripting (XSS) attacks, as reported by ESET. This operation, named Operation RoundPress, began in 2023 and highlights the ongoing threat posed by advanced persistent threats (APTs) in targeting critical infrastructure.


Impact: ["MDaemon", "Roundcube", "Horde", "Zimbra"]

In the Wild: Yes

Age: Discovered in 2023

Remediation: Apply patches

Zero-day Threat Actor

Published:

The Hacker News
Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper

Researchers have identified a malicious npm package called 'os-info-checker-es6' that uses Unicode steganography to conceal its harmful code. This package employs a Google Calendar event short link to deliver a subsequent payload to compromised systems, highlighting the evolving tactics used in cyberattacks.


Impact: ["npm package", "Google Calendar"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Remove the malicious package and monitor systems for any unauthorized activity.

Google Malware

Published:

SecurityWeek
Canadian Electric Utility Lists Customer Information Stolen by Hackers

Nova Scotia Power has reported a cyberattack that resulted in the theft of a variety of personal and financial information from its customers. This incident highlights the ongoing risks that electric utilities face from cyber threats, emphasizing the need for robust cybersecurity measures.


Impact: Not specified

In the Wild: Unknown

Age: Recently disclosed

Remediation: None available

Data Breach

Published:

SecurityWeek
Australian Human Rights Commission Discloses Data Breach

The Australian Human Rights Commission has reported an inadvertent exposure of data submitted through its website's complaint form. This breach raises significant concerns about the handling of sensitive information by public institutions.


Impact: Not specified

In the Wild: No

Age: Recently disclosed

Remediation: None available

Data Breach

Published:

SecurityWeek
Chrome 136 Update Patches Vulnerability With ‘Exploit in the Wild’

Google has released a Chrome 136 update to address a high-severity vulnerability that is currently being exploited publicly. This update is significant as it helps protect users from potential attacks leveraging this flaw.


Impact: ["Google Chrome"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Apply patches

Google Exploit Vulnerability Update

Published:

WeLiveSecurity
Operation RoundPress

ESET researchers have identified a Russia-aligned espionage operation that exploits XSS vulnerabilities to target webmail servers. This operation highlights the ongoing threat to webmail services and the need for enhanced security measures to protect sensitive communications.


Impact: ["Webmail servers"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Apply patches, Update software

Published:

The Hacker News
New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy

Google has released updates for Chrome to address four security issues, including a high-severity vulnerability (CVE-2025-4664) that is actively being exploited. This vulnerability involves insufficient policy enforcement in a component known as Loader, which could lead to cross-origin data leaks.


Impact: ["Google Chrome"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Apply patches

CVE Google Exploit Vulnerability

Published:

darkreading
Infosec Layoffs Aren't the Bargain That Boards May Think

The article discusses how layoffs in the information security sector may seem like a cost-saving measure for boards, but they come with significant hidden costs, such as increased insider threats and weakened cybersecurity defenses. These factors can ultimately give skilled adversaries an advantage, highlighting the importance of maintaining robust security teams.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

darkreading
AI Agents May Have a Memory Problem

A study by Princeton University and Sentient reveals that AI agents can be easily manipulated into exhibiting harmful behavior by introducing false 'memories' into their decision-making data. This raises significant concerns about the reliability and security of AI systems in various applications.


Impact: Not specified

In the Wild: Unknown

Age: Recently disclosed

Remediation: None available

Published:

darkreading
Using a Calculator to Take Guesswork Out of Measuring Cyber Risk

Organizations struggle with the complexity of accurately measuring their cyber risk due to various influencing factors. Resilience's risk calculator tool offers a solution by allowing organizations to assess their cyber risk based on their specific variables, enabling them to make better-informed security decisions.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

darkreading
Ivanti EPMM Zero-Day Flaws Exploited in Chained Attack

Ivanti has reported that zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) have been exploited in a limited number of cases. These vulnerabilities are linked to open source libraries and pose significant risks to affected customers.


Impact: ["Endpoint Manager Mobile", "Ivanti"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Apply patches

Zero-day

Published:

SecurityWeek
Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware

Google has introduced an 'Advanced Protection' mode for Android to enhance security for high-risk users against sophisticated mobile malware. This feature consolidates multiple protective measures into a single toggle, addressing the growing threat of surveillance spyware.


Impact: ["Android"]

In the Wild: No

Age: Recently disclosed

Remediation: None available

Android Google Malware

Published: