Aggregator
Fraudulent email domain tracker: April 2025
This is the first release in a new Castle series highlighting email domains associated with fraudulent activity. Our goal is to provide visibility into email infrastructure commonly abused by bots and fraudsters, so that security teams can improve their detection systems.
Each month, we’ll publish a ranked list
The post Fraudulent email domain tracker: April 2025 appeared first on Security Boulevard.
Рекордная волна сканирования .git/config: более 4800 IP за двое суток — и это только начало
Pentagon Stealer: Go and Python Malware with Crypto Theft Capabilities
The current article provides technical analysis of an emerging malware named Pentagon Stealer. The research has been prepared by the analyst team at ANY.RUN. Key Takeaways How We Discovered Pentagon Stealer In early March of this year, when browsing Public submissions, the ANY.RUN team came across an interesting malware sample written in Golang. View sandbox […]
The post Pentagon Stealer: Go and Python Malware with Crypto Theft Capabilities appeared first on ANY.RUN's Cybersecurity Blog.
CVE-2025-24271 | Apple tvOS AirPlay access control
CVE-2025-24271 | Apple iOS/iPadOS AirPlay access control
CVE-2025-24271 | Apple macOS AirPlay access control
CVE-2025-24271 | Apple visionOS AirPlay access control
CVE-2025-31202 | Apple tvOS null pointer dereference
CVE-2025-30445 | Apple tvOS type confusion
CVE-2025-30445 | Apple iOS/iPadOS type confusion
CVE-2025-30445 | Apple macOS type confusion
CVE-2025-30445 | Apple visionOS type confusion
CVE-2025-31197 | Apple tvOS denial of service
CVE-2025-31197 | Apple iOS/iPadOS denial of service
CVE-2025-31197 | Apple macOS denial of service
CVE-2025-31197 | Apple visionOS denial of service
CISA Releases Three Industrial Control Systems Advisories
CISA released three Industrial Control Systems (ICS) advisories on April 29, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-119-01 Rockwell Automation ThinManager
- ICSA-25-119-02 Delta Electronics ISPSoft
- ICSA-25-105-05 Lantronix XPort (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2025-31324 SAP NetWeaver Unrestricted File Upload Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.