Public Exploit Released for Critical SAP NetWeaver Flaw

Public Exploit Released for Critical SAP NetWeaver Flaw

A critical vulnerability in SAP NetWeaver AS Java Visual Composer, tracked as CVE-2025-31324, is now being widely exploited following the release of public exploit tooling. The flaw, patched in April 2025, allows unauthenticated remote code execution via the platform’s metadata uploader endpoint. What’s new is the public availability of the full source code, which makes … Ler mais

Allianz Life Data Breach Exposes Personal Data of 1.1 Million

Allianz Life Data Breach Exposes Personal Data of 1.1 Million

A cyber-attack on Allianz Life in July has exposed the personal information of about 1.1 million customers, according to new data byHave I Been Pwned. The breach targeted a cloud-based customer relationship management (CRM) system and is part of a larger campaign against companies using Salesforce-hosted databases. Allianz Life, a US subsidiary of German insurer … Ler mais

Canadian Financial Regulator Hacked, Exposing Personal Data from Membe

Canadian Financial Regulator Hacked, Exposing Personal Data from Membe

A Canadian financial regulator has disclosed a cybersecurity incident, which has breached the personal information of member firms and their employees. The Canadian Investment Regulatory Organization (CIRO), a national self-regulatory organization covering all investment dealers, mutual fund dealers and trading activity on Canada’s debt and equity marketplaces, revealed it identified the cybersecurity threat on August … Ler mais

Attacker “Patches” Vulnerability Post Exploitation to Lock Out Competi

Attacker “Patches” Vulnerability Post Exploitation to Lock Out Competi

A threat actor has been observed “patching” a vulnerability post exploitation, likely in a bid to lock out other adversaries and secure exclusive access. The novel tactic was detected by Red Canary researchers in a cluster of activity targeting a flaw in Apache ActiveMQ, an open-source message broker, to gain persistent access on cloud-based Linux … Ler mais

Surto em varreduras da Hacked Cisco, Linksys e Araknis Routers

Surge in Scans From Hacked Cisco, Linksys, and Araknis Routers

Os pesquisadores de segurança cibernética identificaram um aumento significativo nas atividades de varredura maliciosas originárias de equipamentos de rede de consumidores e empresas comprometidas, com foco particular nos modelos Cisco, Linksys e Araknis. A ShadowsServer Foundation, uma importante organização de inteligência de ameaças, relatou observar padrões incomuns de varredura que sugerem comprometimento generalizado desses dispositivos … Ler mais

Legitimate Chrome VPN Extension Turns to Browser Spyware

Legitimate Chrome VPN Extension Turns to Browser Spyware

A popular Google-featured browser extension offering a virtual private network (VPN) service recently turned malicious and is now spying on users’ every move online. Researchers from Koi Security detected that FreeVPN.One, a VPN extension with over 100,000 installs on the Chrome Web Store, a ‘Verified’ status and a 3.8/5 rating from 1110 reviews, has been … Ler mais

Sap 0 dias de exploração vazado por hackers Shinyhunters

SAP 0-Day Exploit Reportedly Leaked by ShinyHunters Hackers

Uma exploração sofisticada direcionada às vulnerabilidades críticas da SAP foi divulgada publicamente pelo notório grupo de hackers Shinyhunters, aumentando significativamente o cenário de ameaças para a empresa SEIVA ambientes. A exploração, que faz as correções de várias vulnerabilidades de dia zero, supostamente vazou através do grupo “Lapsus $ Hunters-Shinyhunters” no telegrama e posteriormente publicado pelo … Ler mais

O novo Android Attack tem como alvo os usuários indianos com subsídio gratuito de eletricidade para instalar malware

New Android Attack Targets Indian Users with Free Electricity Subsidy to Install Malware

A newly identified Android phishing campaign is aggressively targeting Indian users by masquerading as the legitimate PM Surya Ghar: Muft Bijli Yojana, a government initiative approved in February 2024 that offers subsidies for solar rooftop installations, covering up to 60% of costs for systems under 2kW and 40% for those up to 3kW. Os invasores … Ler mais

Zero-Day Exploit in WinRAR File – Schneier on Security

A zero-day vulnerability in WinRAR is being exploited by at least two Russian criminal groups: The vulnerability seemed to have super Windows powers. It abused alternate data streams, a Windows feature that allows different ways of representing the same file path. The exploit abused that feature to trigger a previously unknown path traversal flaw that … Ler mais

South Yorkshire Police Deletes 96,000 Pieces of Digital Evidence

South Yorkshire Police Deletes 96,000 Pieces of Digital Evidence

The UK’s data protection regulator has reprimanded South Yorkshire Police (SYP) after it deleted 96,000 pieces of evidence from officers’ bodycams. The Information Commissioner’s Office (ICO) highlighted multiple failings related to backup, record keeping and data management. After an IT upgrade in May 2023, the centralized Digital Evidence Management (DEMS) system to which officers uploaded … Ler mais