Aggregator
CVE-2025-31239 | Apple iOS/iPadOS File Parser use after free (EUVD-2025-14774)
China-linked Murky Panda targets and moves laterally through cloud services
In its recently released 2025 Threat Hunting Report, Crowdstrike pointed out an interesting trend: a 136% surge in cloud intrusions. A good chunk of this surge is due to “China-nexus adversaries”, Murky Panda (aka Silk Typhoon) among them. Murky Panda’s modus operandi The group has been active since at least 2023, and is primarily focused on breaching government, technology, academia, legal, and professional services entities in North America and stealing sensitive information from them. The … More →
The post China-linked Murky Panda targets and moves laterally through cloud services appeared first on Help Net Security.
Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
BQTLOCK Ransomware-as-a-Service Emerges, Boasting Sophisticated Evasion Tactics
Ransomware-as-a-Service (RaaS) models continue to democratize sophisticated attacks in the ever-changing world of cybercrime by allowing affiliates with little technical know-how to distribute ransomware through profit-sharing or subscription models. A newly identified strain, BQTLock, has emerged since mid-July 2025, operating under this RaaS paradigm and marketed aggressively on dark web forums and Telegram channels. Overview […]
The post BQTLOCK Ransomware-as-a-Service Emerges, Boasting Sophisticated Evasion Tactics appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-43214 | Apple watchOS Web memory corruption (EUVD-2025-23127)
CVE-2025-43214 | Apple iOS/iPadOS Web memory corruption (EUVD-2025-23127)
CVE-2025-43214 | Apple tvOS Web memory corruption (EUVD-2025-23127)
CVE-2025-43214 | Apple visionOS Web memory corruption (EUVD-2025-23127)
CVE-2025-43214 | Apple macOS Web memory corruption (EUVD-2025-23127)
CVE-2025-9341 | Bouncy Castle for Java FIPS up to 2.1.0 API Module AESNativeCBC.Java resource consumption (EUVD-2025-25504 / WID-SEC-2025-1895)
CVE-2025-9340 | Bouncy Castle for Java up to 2.1.0 API Module BaseCipher out-of-bounds write (EUVD-2025-25505 / WID-SEC-2025-1895)
Automated Vulnerability Management: What It Is & Why You Need It
Organizations nowadays are struggling with a growing IT environment, cloud-based workloads, APIs, IoT devices, and containerized applications are just a few of the ingredients thrown into the mix. With every...
The post Automated Vulnerability Management: What It Is & Why You Need It appeared first on Strobes Security.
The post Automated Vulnerability Management: What It Is & Why You Need It appeared first on Security Boulevard.
Alleged Data Breach of Ada Yazılım
CVE-2025-57896 | andy_moyle Church Admin Plugin up to 5.0.26 on WordPress authorization (EUVD-2025-25519)
CVE-2025-57894 | ollybach WPPizza Plugin up to 3.19.8 on WordPress authorization (EUVD-2025-25517)
CVE-2025-57893 | Epsiloncool WP Fast Total Search Plugin up to 1.79.270 on WordPress cross-site request forgery (EUVD-2025-25516)
CVE-2025-57895 | Hossni Mubarak JobWP Plugin up to 2.4.3 on WordPress cross-site request forgery (EUVD-2025-25518)
CVE-2025-57892 | Jeff Starr Simple Statistics for Feeds Plugin up to 20250322 on WordPress cross-site request forgery (EUVD-2025-25515)
Survey Finds Cybersecurity Teams Overwhelmed by Cloud Security Alerts
A survey of 400 cybersecurity professionals from organizations with more than 500 employees finds about half of organizations investigate between 70% and 89% of cloud security alerts within 24 hours. Conducted by CyberEdge Group on behalf of SentinelOne, the survey also finds only 29% are able to investigate more than 90% of their cloud security..
The post Survey Finds Cybersecurity Teams Overwhelmed by Cloud Security Alerts appeared first on Security Boulevard.