Aggregator
Randall Munroe’s XKCD ‘Replication Crisis’
8 months 3 weeks ago
via the comic artistry and dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Replication Crisis’ appeared first on Security Boulevard.
Marc Handelman
Alleged Data Breach of Total Mortgage
8 months 3 weeks ago
Alleged Data Breach of Total Mortgage
Dark Web Informer - Cyber Threat Intelligence
Google Cloud Security Threat Horizons Report #12 Is Out!
8 months 3 weeks ago
This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our next Threat Horizons Report, #12 (full version) that we just released (the official blog for #1 report, my unofficial blogs for #2, #3, #4, #5, #6, #7, #8, #9, #10 and #11).
My favorite quotes from the report follow below:
- “Google Cloud’s latest research highlights that common hygiene gaps like credential issues and misconfigurations are persistently exploited by threat actors to gain entry into cloud environments. During the first half of 2025, weak or absent credentials were the predominant threat, accounting for 47.1% of incidents. Misconfigurations (29.4%) and API/UI compromises (11.8%) followed as the next most frequently observed initial access vectors.“
- “Notably, compared to H2 2024, we observed a 4.9% decrease in misconfiguration-based access and a 5.3% decrease in API/UI compromises (i.e., when an unauthorized entity gains access to, or manipulates a system or data through an application’s user-facing screen or its programmatic connections). This shift appears to be partly absorbed by the rise of leaked credentials representing 2.9% of initial access in H1 2025. ” [A.C. — It gently suggests that while we’re making some progress on configurations, the attackers are moving to where the fruit is even more low-hanging: already leaked credentials.]
- “Foundational security remains the strongest defense: Google Cloud research indicates that credential compromise and misconfiguration remain the primary entry points for threat actors into cloud environments, emphasizing the critical need for robust identity and access management and proactive vulnerability management.” [A.C. — it won’t be the magical AI that saves you, it would be not given admin to employees]
- “Financially motivated threat groups are increasingly targeting backup systems as part of their primary objective, challenging traditional disaster recovery, and underscoring the need for resilient solutions like Cloud Isolated Recovery Environments (CIRE) to ensure business continuity.” [A.C. — if your key defense against ransomware is still backups, well, we got some “news” got you…]
- “Advanced threat actors are leveraging social engineering to steal credentials and session cookies, bypassing MFA to compromise cloud environments for financial theft, often targeting high-value assets.” [A.C. — this is NOT an anti-MFA stance, this is a reminder that MFA helps a whole lot, yet if yours can be bypassed, then its value diminishes]
- “Threat actors are increasingly co-opting trusted cloud storage services as a key component in their initial attack chains, deceptively using these platforms to host seemingly benign decoy files, often PDFs.“ and “threat actors used .desktop files to infect systems by downloading decoy PDFs from legitimate cloud storage services from multiple providers, a tactic that deceives victims while additional malicious payloads are downloaded in the background” [A.C. — a nice example of thinking about how the defender will respond by the attacker here]
- “more traditional disaster recovery approaches, focused primarily on technical restoration, often fall short in addressing the complexities of recovering from a cyber event, particularly the need to re-establish trust with third parties.” [A.C. — The technical recovery is only half the battle. This speaks to the human element of incident response, and the broader impact of a breach.]
Now, go and read the THR 12 report!
Related posts:
- EP112 Threat Horizons — How Google Does Threat Intelligence podcast
- Google Cloud Security Threat Horizons Report #11 Is Out!
- Google Cloud Security Threat Horizons Report #10 Is Out!
- Google Cybersecurity Action Team Threat Horizons Report #9 Is Out!
- Google Cybersecurity Action Team Threat Horizons Report #8 Is Out!
- Google Cybersecurity Action Team Threat Horizons Report #7 Is Out!
- Google Cybersecurity Action Team Threat Horizons Report #6 Is Out!
- Google Cybersecurity Action Team Threat Horizons Report #5 Is Out!
- Google Cybersecurity Action Team Threat Horizons Report #4 Is Out!
- Google Cybersecurity Action Team Threat Horizons Report #3 Is Out!
- Google Cybersecurity Action Team Threat Horizons Report #2 Is Out!
- Illicit coin mining, ransomware, APTs target cloud users in first Google
- Cybersecurity Action Team Threat Horizons report
The post Google Cloud Security Threat Horizons Report #12 Is Out! appeared first on Security Boulevard.
Anton Chuvakin
CVE-2025-8376 | code-projects Vehicle Management 1.0 /updatebal.php company sql injection
8 months 3 weeks ago
A vulnerability classified as critical has been found in code-projects Vehicle Management 1.0. Affected is an unknown function of the file /updatebal.php. The manipulation of the argument company leads to sql injection.
This vulnerability is traded as CVE-2025-8376. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2025-8375 | code-projects Vehicle Management 1.0 /addvehicle.php vehicle sql injection
8 months 3 weeks ago
A vulnerability was found in code-projects Vehicle Management 1.0. It has been rated as critical. This issue affects some unknown processing of the file /addvehicle.php. The manipulation of the argument vehicle leads to sql injection.
The identification of this vulnerability is CVE-2025-8375. The attack may be initiated remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2025-8374 | code-projects Vehicle Management 1.0 /addcompany.php company sql injection
8 months 3 weeks ago
A vulnerability was found in code-projects Vehicle Management 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /addcompany.php. The manipulation of the argument company leads to sql injection.
This vulnerability was named CVE-2025-8374. The attack can be initiated remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2025-8373 | code-projects Vehicle Management 1.0 /print.php sno sql injection
8 months 3 weeks ago
A vulnerability was found in code-projects Vehicle Management 1.0. It has been classified as critical. This affects an unknown part of the file /print.php. The manipulation of the argument sno leads to sql injection.
This vulnerability is uniquely identified as CVE-2025-8373. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
vuldb.com
Russia blocks popular US-made internet speed test tool over national security concerns
8 months 3 weeks ago
Speedtest, made by Seattle-based Ookla, collects data that could be exploited for cyberattacks, Russia's telecom regulator said in blocking the service.
Cisco ISE重大漏洞利用程序已现,且遭实际攻击
8 months 3 weeks ago
安全客
ИИ садится рядом с вами на интервью — Meta запускает новую реальность
8 months 3 weeks ago
Тест или отбор новой расы программистов?
微软将在10月停止对 Windows 11 22H2 的支持
8 months 3 weeks ago
安全客
Submit #624008: code-projects Vehicle Management V1.0 SQL injection [Accepted]
8 months 3 weeks ago
Submit #624008 / VDB-318348
wllovemy
Submit #624007: code-projects Vehicle Management V1.0 SQL injection [Accepted]
8 months 3 weeks ago
Submit #624007 / VDB-318347
wllovemy
Submit #624006: code-projects Vehicle Management V1.0 SQL injection [Accepted]
8 months 3 weeks ago
Submit #624006 / VDB-318346
wllovemy
Submit #624005: code-projects Vehicle Management V1.0 SQL injection [Accepted]
8 months 3 weeks ago
Submit #624005 / VDB-318345
wllovemy
ISC.AI 2025主题前瞻:ALL IN AGENT,全面拥抱智能体时代!
8 months 3 weeks ago
安全客
英国网络实名法规生效,VPN下载量暴增
8 months 3 weeks ago
安全客
Scattered Spider 正在进行 VMware ESXi 黑客攻击狂潮
8 months 3 weeks ago
安全客
Promociones y Cobranzas Beta S.A Falls Victim to Qilin Ransomware
8 months 3 weeks ago
Promociones y Cobranzas Beta S.A Falls Victim to Qilin Ransomware
Dark Web Informer - Cyber Threat Intelligence