VulnHub

AI-Powered Cybersecurity Intelligence

Last Update Check:

Latest Intelligence

darkreading
Windows Zero-Day Bug Exploited for Browser-Led RCE

A zero-day vulnerability in Windows has been exploited for remote code execution (RCE) via browsers, highlighting significant security risks. Microsoft's May 2025 Patch Tuesday update addresses this and several other critical vulnerabilities, underscoring the ongoing threat landscape.


Impact: ["Windows"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Apply patches

Windows Zero-day Microsoft Patch Update

Published:

darkreading
Chinese Actor Hit Taiwanese Drone Makers, Supply Chains

The article discusses a cybersecurity threat posed by a Chinese actor known as Tidrone, which targets Taiwanese drone manufacturers and their supply chains, particularly in military and satellite sectors. This attack highlights the vulnerabilities within the interconnected supply chains of critical technologies and raises concerns about national security.


Impact: ["Drones", "Military entities", "Satellite sector", "ERP software"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Implement workarounds, Vendor advisory pending

Published:

SecurityWeek
Adobe Patches Big Batch of Critical-Severity Software Flaws

Adobe has released a significant update addressing critical vulnerabilities in its software, particularly focusing on Adobe ColdFusion. This update is crucial for mitigating risks associated with code execution and privilege escalation attacks.


Impact: ["Adobe ColdFusion"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: Apply patches

Patch Update

Published:

darkreading
What Does EU's Bug Database Mean for Vulnerability Tracking?

The EU cyber agency ENISA has introduced the EU vulnerability database (EUVD), which aims to enhance the tracking of vulnerabilities and improve the management of Common Vulnerabilities and Exposures (CVEs). This initiative is significant as it fosters a more systematic approach to vulnerability tracking across the EU, potentially impacting cybersecurity practices and policies.


Impact: Not specified

In the Wild: Unknown

Age: Recently disclosed

Remediation: None available

CVE Vulnerability

Published:

SecurityWeek
Microsoft to Lay Off About 3% of Its Workforce

Microsoft is set to lay off approximately 3% of its workforce, which translates to around 6,000 employees. This significant reduction reflects broader trends in the tech industry and may have implications for its operational capabilities and market position.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Microsoft

Published:

darkreading
CISA Warns of TeleMessage Vuln Despite Low CVSS Score

CISA has issued a warning regarding a vulnerability in the TeleMessage app, which claims to use end-to-end encryption. Despite its low CVSS score, hackers have been able to access archived data on the app's servers, highlighting significant security concerns.


Impact: ["TeleMessage app"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Apply patches

Vulnerability Data Breach

Published:

SecurityWeek
Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday

Microsoft addressed at least 70 security vulnerabilities in its latest Patch Tuesday, including five zero-days that are currently being exploited. This highlights the ongoing challenges organizations face in securing their systems against active threats.


Impact: ["Windows", "Microsoft products"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Apply patches

Zero-day Microsoft Patch

Published:

The Hacker News
China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide

A critical security flaw in SAP NetWeaver, identified as CVE-2025-31324, is being exploited by China-linked nation-state actors to breach critical infrastructure networks globally. This unauthenticated file upload vulnerability allows for remote code execution, posing significant risks to affected systems.


Impact: ["SAP NetWeaver"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Apply patches

CVE Exploit Vulnerability

Published:

The Hacker News
Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads

Researchers have identified a malicious package named 'solana-token' on the Python Package Index (PyPI) that masqueraded as a Solana blockchain tool but was designed to steal source code and developer secrets. Despite being removed from PyPI, the package was downloaded 761 times, highlighting significant risks associated with third-party package repositories.


Impact: ["solana-token package", "Python Package Index (PyPI)"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Remove the malicious package from systems and monitor for any unauthorized access to source code.

Malware

Published:

darkreading
DeepSeek, Deep Research Mean Deep Changes for AI Security

The article emphasizes the critical need to secure the inference chain in AI applications and infrastructure, highlighting it as a top priority for ensuring the safety and integrity of AI systems. This focus is significant as vulnerabilities in AI can lead to severe security implications across various sectors.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

SecurityWeek
Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments

The article emphasizes the importance of sharing cyber threat intelligence (CTI) and digital brand protection insights beyond just security and cyber teams, advocating for broader collaboration across various functions and departments within organizations. This approach is significant as it enhances overall cybersecurity posture and ensures that all relevant stakeholders are informed and prepared against potential threats.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

SecurityWeek
SAP Patches Another Critical NetWeaver Vulnerability

SAP has issued 16 new security notes during its May 2025 Security Patch Day, addressing a critical vulnerability in its NetWeaver platform. This highlights the ongoing importance of patch management and security updates in safeguarding enterprise systems.


Impact: ["NetWeaver"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: Apply patches

Vulnerability Patch

Published:

SecurityWeek
Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023

Radware has confirmed that the vulnerabilities in their Cloud WAF product, which were disclosed by CERT/CC, were patched two years ago. This highlights the importance of timely updates and vulnerability management in cybersecurity.


Impact: ["Radware Cloud WAF"]

In the Wild: No

Age: Older vulnerability

Remediation: The vulnerabilities were addressed with patches issued two years ago.

Published:

All CISA Advisories
CISA Adds Five Known Exploited Vulnerabilities to Catalog

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation, highlighting significant risks to federal networks. The vulnerabilities primarily affect Microsoft Windows components, emphasizing the need for timely remediation to protect against cyber threats.


Impact: ["Microsoft Windows DWM Core Library", "Microsoft Windows Common Log File System (CLFS) Driver", "Microsoft Windows Scripting Engine", "Microsoft Windows Ancillary Function Driver for WinSock"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Federal agencies are required to remediate identified vulnerabilities by the due date; all organizations are urged to prioritize timely remediation.

Windows CVE Microsoft Vulnerability

Published:

All CISA Advisories
Hitachi Energy Service Suite

The Hitachi Energy Service Suite has multiple critical vulnerabilities, including HTTP request smuggling and resource allocation issues, that could potentially compromise the confidentiality, integrity, or availability of affected devices. These vulnerabilities are significant as they can be exploited remotely with low complexity, posing a serious risk to users of the affected software versions.


Impact: ["Hitachi Energy Service Suite: Versions 9.8.1.3 and prior", "Apache HTTP Server 2.4.53 and earlier"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: Users are advised to apply patches and update to the latest versions of the affected software.

Windows Phishing CVE Vulnerability Update

Published: