Warlock Ransomware Group Augments Post-Exploitation Activities
(darkreading.com)
1.
2.
Most Google Cloud Attacks Start With Bug Exploitation
(darkreading.com)
3.
Hacker broke into FBI and compromised Epstein files, report says
(techcrunch.com)
4.
Flaw in Grandstream VoIP phones allows stealthy eavesdropping
(bleepingcomputer.com)
5.
Sleeper Shells: Attackers Are Planting Dormant Backdoors in Ivanti EPMM
(news.ycombinator.com)
6.
Ivanti warns of two EPMM flaws exploited in zero-day attacks
(bleepingcomputer.com)
8.
OpenAI’s child exploitation reports increased sharply this year
(arstechnica.com)
9.
10.
Attackers Exploited Gogs Zero-Day Flaw for Months
(darkreading.com)
11.
React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable
(bleepingcomputer.com)
12.
RondoDox botnet malware now hacks servers using XWiki flaw
(bleepingcomputer.com)
13.
Two Windows vulnerabilities, one a 0-day, are under active exploitation
(arstechnica.com)
14.
WordPress security plugin exposes private data to site subscribers
(bleepingcomputer.com)
15.
Hackers exploiting critical "SessionReaper" flaw in Adobe Magento
(bleepingcomputer.com)
16.
17.
18.
Citrix Bleed 2 exploited weeks before PoCs as Citrix denied attacks
(bleepingcomputer.com)
19.
CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
(bleepingcomputer.com)
20.
21.
Over 46,000 Grafana instances exposed to account takeover bug
(bleepingcomputer.com)