Aggregator
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2025-24893 XWiki Platform Eval Injection Vulnerability
- CVE-2025-41244 Broadcom VMware Aria Operations and VMware Tools Privilege Defined with Unsafe Actions Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
New Guidance Released on Microsoft Exchange Server Security Best Practices
Today, CISA, in partnership with the National Security Agency and international cybersecurity partners, released Microsoft Exchange Server Security Best Practices, a guide to help network defenders harden on-premises Exchange servers against exploitation by malicious actors.
Threat activity targeting Exchange continues to persist, and organizations with unprotected or misconfigured Exchange servers remain at high risk of compromise.
Best practices in this guide focus on hardening user authentication and access, ensuring strong network encryption, and minimizing application attack surfaces. CISA recommends organizations also decommission any remaining end-of-life on-premises or hybrid Exchange servers after transitioning to Microsoft 365, as retaining the “last Exchange server” can expose organizations to ongoing exploitation activity.
CISA recommends organizations implement Microsoft Exchange Server Best Practices and take steps to decommission end-of-life on-premises Exchange servers in hybrid environments to significantly reduce their risk from cyber threats.
CISA Releases Two Industrial Control Systems Advisories
CISA released two Industrial Control Systems (ICS). These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-303-01 International Standards Organization ISO 15118-2
- ICSA-25-303-02 Hitachi Energy TropOS
CISA encourages users and administrators to review newly released ICS Advisories for technical details and mitigations.
【活动】双十一风控专项,国际业务首测!
The Death of the Security Checkbox: BAS Is the Power Behind Real Defense
Russian Hackers Exploit Adaptix Pentesting Tool in Ransomware Attacks
Microsoft promises more Copilot features in Microsoft 365 companion apps
90% Windows-игр теперь работают на Linux: Совместимость достигла исторического максимума
NFC Relay Attack: 700+ Android Apps Harvest Banking Login Details
A sophisticated cybercrime campaign leveraging Near Field Communication technology has exploded across multiple continents, with researchers at zLabs identifying over 760 malicious Android applications designed to steal banking credentials and facilitate fraudulent transactions. What initially appeared as isolated incidents in April 2024 has evolved into a large-scale threat operation targeting financial institutions across Russia, Poland, […]
The post NFC Relay Attack: 700+ Android Apps Harvest Banking Login Details appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
【安全圈】全球 Android 用户面临 NFC 恶意软件威胁支付交易或被克隆
【安全圈】俄罗斯黑客针对乌克兰政府组织发起攻击
【安全圈】Bitter APT 利用旧 WinRAR 漏洞发起新型后门攻击
【安全圈】微软 Azure 全球宕机超 8 小时,Xbox 与 Microsoft 365 服务全面中断
Proton Claims 300 Million Records Compromised So Far This Year
解决了一个大麻烦
PhantomRaven Attack Involves 126 Malicious npm Packages with Over 86,000 Downloads Hiding Malicious Code
A sophisticated malware campaign targeting developers has been operating since August 2025, deploying 126 malicious npm packages that have collectively accumulated over 86,000 downloads. The attack, now identified as PhantomRaven, has been actively harvesting npm authentication tokens, GitHub credentials, and CI/CD pipeline secrets from developers across the globe while employing advanced detection evasion techniques that […]
The post PhantomRaven Attack Involves 126 Malicious npm Packages with Over 86,000 Downloads Hiding Malicious Code appeared first on Cyber Security News.