Microsoft fixes Windows 11 24H2 updates failing with 0x80240069 error

Picus Red Report 2025

Microsoft has resolved a known issue preventing the August 2025 Windows 11 24H2 cumulative update from being delivered via Windows Server Update Services (WSUS). Introduced almost twenty years ago, WSUS helps IT administrators defer, approve, and schedule updates for Microsoft products on enterprise networks from a single local update server, rather than having each endpoint … Ler mais

Proxyware Campaign Piggybacks on Popular YouTube Video Download Services

Proxyware Campaign Piggybacks on Popular YouTube Video Download Services

The AhnLab Security Intelligence Center (ASEC) has uncovered fresh instances of proxyware distribution by threat actors leveraging deceptive advertising on freeware sites. Building on prior reports, such as the “DigitalPulse Proxyware Being Distributed Through Ad Pages” analysis, this campaign continues to exploit unwitting users in South Korea, installing unauthorized bandwidth-sharing tools like DigitalPulse and Honeygain. … Ler mais

Manpower data breach impacted 144,180 individuals

Northwest Radiologists data breach hits 350,000 in Washington

Manpower data breach impacted 144,180 individuals Global staffing and workforce solutions firm Manpower reports a January RansomHub ransomware attack that compromised data of 140,000 individuals. Manpower in Lansing, Michigan, reported that the ransomware attack that disrupted its systems on January 20, 2025, resulted in a breach that impacted 144,180 individuals. The company launched an investigation … Ler mais

Xerox FreeFlow Core Vulnerability Allows Remote Code Execution — PoC Now Public

Xerox FreeFlow Core Vulnerability Allows Remote Code Execution — PoC Now Public

Security researchers have disclosed critical vulnerabilities in Xerox FreeFlow Core that enable unauthenticated remote attackers to execute arbitrary code on vulnerable systems. The proof-of-concept exploits are now publicly available, raising immediate concerns for organizations using the popular print orchestration platform. Critical Vulnerabilities Discovered Cybersecurity firm Horizon3.ai discovered two severe vulnerabilities in Xerox FreeFlow Core: an … Ler mais

Critical WordPress Plugin Vulnerability Puts 70,000+ Sites at Risk of Remote Code Execution

Critical WordPress Plugin Vulnerability Puts 70,000+ Sites at Risk of Remote Code Execution

A severe security vulnerability has been discovered in a popular WordPress plugin used by over 70,000 websites worldwide, potentially exposing them to complete takeover by malicious actors. The vulnerability, tracked as CVE-2025-7384, affects the “Database for Contact Form 7, WPforms, Elementor forms” plugin and carries a critical CVSS score of 9.8 out of 10. Vulnerability … Ler mais

CISA Alerts on N-able N-Central Deserialization and Injection Flaw Under Active Exploitation

CISA Alerts on N-able N-Central Deserialization and Injection Flaw Under Active Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has issued urgent alerts regarding two critical vulnerabilities in N-able N-Central that are currently being actively exploited, prompting immediate action from organizations using this remote monitoring and management platform. These vulnerabilities, identified as CVE-2025-8875 and CVE-2025-8876, represent significant security risks that could enable attackers to execute commands and … Ler mais

Google Gemini's Deep Research is finally coming to API

Picus Red Report 2025

Google Gemini’s one of the most powerful features is Deep Research, but up until now, it has been strictly limited to the Gemini interface. This could change soon. With Deep Research in Gemini, you can search about pretty much anything, including scholars, existing research papers, and more. Google describes Deep Research as an agentic Research … Ler mais

U.S. CISA adds Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR flaws to its Known Exploited Vulnerabilities catalog U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA)added Microsoft Internet Explorer, Microsoft Office Excel, … Ler mais

OpenAI relaxes GPT-5 rate limit, promises to improve the personality

GPT-5

OpenAI is slowly addressing all concerns around GPT-5, including rate limits and now its personality, which has been criticized for being less affirmative. In a support document, OpenAI confirmed it has restored the older models for paid customers, so you can now use GPT4o, GPT o3, and more. You just need to use the model … Ler mais

Critical Patches Issued for Microsoft Products, August 12, 2025

MS-ISAC ADVISORY NUMBER: 2025-070 DATE(S) ISSUED: 08/12/2025 OVERVIEW: Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or … Ler mais