Multiple Vulnerabilities in Commvault Backup & Recovery Could Allow for Remote Code Execution

MS-ISAC ADVISORY NUMBER: 2025-074 DATE(S) ISSUED: 08/20/2025 OVERVIEW: Multiple vulnerabilities have been discovered in Commvault Backup & Recovery, which when chained together, could allow for remote code execution. Commvault Backup & Recovery is a comprehensive data protection solution that offers a range of services for safeguarding data across various environments, including on-premises, cloud, and hybrid … Ler mais

Novos malware exploram os sistemas herdados da Tasten para atingir idosos indonésios

UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware

Os atores de ameaças estão alavancando a marca de confiança do Fundo Estadual de Pensões da Indonésia, Pt Dana Tabungan Dan Asuransi Pegawai Negeri (Persero), ou Taspen, para implantar um malicioso Aplicação Android disfarçado de portal oficial. Este trojão bancário e spyware visam pensionistas e funcionários públicos, explorando sistemas herdados e vulnerabilidades de transformação digital … Ler mais

Citrix Patches Three Zero Days as One Sees Active Exploitation

Citrix Patches Three Zero Days as One Sees Active Exploitation

Citrix has released patches for three zero-day vulnerabilities in NetScaler ADC and Gateway, one of which was already being exploited by attackers. The flaws, tracked as CVE-2025-7775, CVE-2025-7776, and CVE-2025-8424, are two memory overflow vulnerabilities and an improper access control on the NetScaler Management Interface. They are all considered critical vulnerabilities, with severity score (CVSS) … Ler mais

We Are Still Unable to Secure LLMs from Malicious Inputs – Schneier on Security

Nice indirect prompt injection attack: Bargury’s attack starts with a poisoned document, which is shared to a potential victim’s Google Drive. (Bargury says a victim could have also uploaded a compromised file to their own account.) It looks like an official document on company meeting policies. But inside the document, Bargury hid a 300-word malicious … Ler mais

A Vulnerability in Apple Products Could Allow for Arbitrary Code Execution

MS-ISAC ADVISORY NUMBER: 2025-075 DATE(S) ISSUED: 08/26/2025 OVERVIEW: A vulnerability has been discovered in Apple products which could allow for arbitrary code execution. Successful exploitation could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, … Ler mais

O Spotify Launces Recurso de Mensagens Diretas em meio a preocupações de segurança

Spotify Launches Direct Messaging Feature Amid Security Concerns

O Spotify, nesta semana, revelou um novo Direct MessagingFeature, permitindo que os usuários compartilhem músicas, podcasts e audiolivros no aplicativo. Enquanto a medida promete recomendações simplificadas e um engajamento mais profundo entre os amigos, também levanta novas considerações de segurança e privacidade. Lançando para usuários gratuitos e premium com 16 anos ou mais em mercados … Ler mais

A falha de Nagios permite que atacantes remotos executem JavaScript arbitrário via XSS

Nagios Flaw Enables Remote Attackers to Run Arbitrary JavaScript via XSS

O NAGIOS abordou uma vulnerabilidade significativa de scripts cruzados (XSS) em sua plataforma de monitoramento corporativo Nagios Xi, que poderia permitir que atacantes remotos executem código JavaScript arbitrário nos navegadores dos usuários. A falha de segurança, descoberta no recurso Explorer Graph, foi corrigida na versão 2024R2.1 em 12 de agosto de 2024. A vulnerabilidade foi … Ler mais

A gangue de ransomware subterrânea liberta táticas inovadoras direcionadas para organizações globais

Chinese Hackers Exploit SharePoint Flaws to Deploy Backdoors, Ransomware, and Loaders

A gangue subterrânea de ransomware tem coordenado ataques recorrentes a empresas em todo o mundo em um aumento preocupante dos riscos cibernéticos. Eles demonstraram engenharia sofisticada de malware que combina técnicas de criptografia de ponta com medidas de penetração focadas. Detectado pela primeira vez em julho de 2023, o grupo ressurgiu em maio de 2024 … Ler mais

ENISA to Coordinate €36m EU-Wide Incident Response Scheme

ENISA to Coordinate €36m EU-Wide Incident Response Scheme

The EU’s security agency is being given €36m ($42m) to handle incident response for major cyber-attacks targeting the bloc. ENISA yesterday announced the signing of a “contribution agreement” which will see it operate the EU Cybersecurity Reserve. This virtual pool of incident response services from trusted private sector providers was established by the EU Cyber … Ler mais

New Data Theft Campaign Targets Salesforce via Salesloft App

New Data Theft Campaign Targets Salesforce via Salesloft App

Salesforce customers have again been targeted in a “widespread data theft campaign,” this time via compromised OAuth tokens associated with thethird-party Salesloft Drift application. Salesloft Drift integrates with Salesforce to help sales and marketing teams collaborate on projects. Salesloft issued a security alert on August 20 revealing it had detected a security issue and “proactively … Ler mais