Aggregator
CVE-2025-0442 | Google Chrome up to 131.0.6778.264 Payments clickjacking
FBI removed PlugX malware from U.S. computers
The Justice Department announced on Tuesday that, alongside international partners, the FBI deleted “PlugX” malware from thousands of infected computers worldwide. As described in court documents unsealed in the Eastern District of Pennsylvania, a group of hackers sponsored by the People’s Republic of China (PRC), known to the private sector as “Mustang Panda” and “Twill Typhoon,” used a version of PlugX malware to infect, control, and steal information from victim computers. According to court documents, … More →
The post FBI removed PlugX malware from U.S. computers appeared first on Help Net Security.
CVE-2025-0441 | Google Chrome up to 131.0.6778.264 Fenced Frames information disclosure
CVE-2025-0439 | Google Chrome up to 131.0.6778.264 Frames race condition
CVE-2025-0438 | Google Chrome up to 131.0.6778.264 Tracing stack-based overflow
G.O.S.S.I.P 阅读推荐 2025-01-15 世间安得两全法
CVE-2025-0480 | wuzhicms 4.1.0 config.php test sphinxhost/sphinxport server-side request forgery
CES 2025: 7 революционных гаджетов, которые изменят нашу повседневную жизнь
CVE-2025-0437 | Google Chrome up to 131.0.6778.264 Metrics out-of-bounds (Nessus ID 214138)
Submit #474965: wuzhicms 4.1.0 SSRF [Accepted]
CISA Releases Microsoft Expanded Cloud Logs Implementation Playbook
Today, CISA released the Microsoft Expanded Cloud Logs Implementation Playbook to help organizations get the most out of Microsoft’s newly introduced logs in Microsoft Purview Audit (Standard). This step-by-step guide enables technical personnel to better detect and defend against advanced intrusion techniques by operationalizing expanded cloud logs.
The playbook details analytical methodologies tied to using these logs. Specifically, the playbook offers:
- An overview of the newly introduced logs in Microsoft Purview Audit (Standard) that enable organizations to conduct forensic and compliance investigations by accessing critical events (e.g., mail items accessed, mail items sent, and user searches in SharePoint Online and Exchange Online).
- A description of administration/enabling actions and ingestion of these logs to Microsoft Sentinel and Splunk Security Information and Event Management (SIEM) systems.
- A discussion of significant events in other M365 services, such as Teams.
CISA encourages organizations to use the playbook to make newly available logs an actionable part of their enterprise cybersecurity operations.