Citrix fixes critical NetScaler RCE flaw exploited in zero-day attacks

Picus Blue Report 2025

Citrix fixed three NetScaler ADC and NetScaler Gatewayflaws today, including a critical remote code execution flaw tracked as CVE-2025-7775 that was actively exploited in attacks as a zero-day vulnerability. The CVE-2025-7775 flaw is a memory overflow bug that can lead tounauthenticated, remote code execution on vulnerable devices. In an advisory released today, Citrix states that … Ler mais

Silk Typhoon hackers hijack network captive portals in diplomat attacks

Picus Blue Report 2025

State-sponsored hackers linked to the Silk Typhoonactivity cluster targeted diplomats by hijacking web traffic to redirect to a malware-serving website. The hackers used anadvanced adversary-in-the-middle (AitM) technique to hijack the captive portal of the network and send the target to the first-stage malware. GoogleThreat Intelligence Group (GTIG) tracks the threat actor as UNC6384 and, based … Ler mais

Apt36 tem como alvo o chefe indiano Linux usando arquivos de atalho .Desktop armas

GPT

Os pesquisadores revelaram o OneFlip, um novo ataque de backdoor de tempo de inferência que compromete as redes neurais profundas de precisão completa (DNNs), lançando apenas um pouco nos pesos do modelo, marcando uma escalada significativa na praticidade de ataques baseados em hardware contra Sistemas de IA. Diferentemente dos métodos tradicionais de backdoor que requerem … Ler mais

Farmers Insurance discloses a data breach impacting 1.1M customers

Farmers Insurance discloses a data breach impacting 1.1M customers

Farmers Insurance discloses a data breach impacting 1.1M customers Farmers Insurance suffered a breach tied to Salesforce attacks, exposing data of 1.1M customers across its nationwide insurance network. Farmers Insurance disclosed a data breach affecting 1,071,172 customers, linked to the recent wave of Salesforce attacks, as per Bleeping Computer. The company is an American insurer … Ler mais

Os atores de ameaças aproveitam os agentes da IA ​​para conduzir ataques de engenharia social

GPT

As paisagens de segurança cibernética estão passando por uma mudança de paradigma, à medida que os atores de ameaças implantam cada vez mais sistemas de IA agênticos para orquestrar ataques sofisticados de engenharia social. Ao contrário do generativo reativo Modelos de IA Isso apenas produz conteúdo como DeepFakes ou e-mails de phishing, a IA Agentic … Ler mais

Citrix fixed three NetScaler flaws, one of them actively exploited in the wild

Dutch NCSC: Citrix NetScaler zero-day breaches critical orgs

Citrix fixed three NetScaler flaws, one of them actively exploited in the wild Citrix addressed three vulnerabilities in NetScaler ADC and NetScaler Gateway, including one that has been actively exploited in the wild. Citrix addressedthree security flaws (CVE-2025-7775, CVE-2025-7776, CVE-2025-8424) in NetScaler ADC and NetScaler Gateway, including one (CVE-2025-7775) that it said has been actively … Ler mais

Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks

Picus Blue Report 2025

Update: Story updated with further information. Hackers breached sales automation platform Salesloft to steal OAuth and refresh tokens from its Drift chat agent integration with Salesforce to pivot to customer environments and exfiltrate data. Salesloft’s SalesDrift is a third-party platform that connects the Drift AI chat agent with a Salesforce instance, allowing organizations to sync … Ler mais

Os TTPs do ator de ameaças da China Mustang vazaram os TTPs

China-Based Threat Actor Mustang Panda’s TTPs Leaked

Um marco significativo para especialistas em segurança cibernética é a divulgação de táticas, métodos e procedimentos específicos (TTPs) usados ​​pelo Mustang Panda, um grupo de ameaça persistente avançado (APT) baseado na China, que iluminou suas intrincadas atividades. Observou pela primeira vez em 2017, mas potencialmente ativo desde 2014, Mustang Panda é um ator patrocinado pelo … Ler mais

Securden Unified Pam Flaut permite que os atacantes ignorem a autenticação

Securden Unified PAM Flaw Allows Attackers to Bypass Authentication

O Securden Unified Pam é uma plataforma abrangente de gerenciamento de acesso privilegiada que é usada para armazenar, gerenciar e monitorar credenciais nas identidades humanas, de máquina e IA em vários ambientes. Os pesquisadores de segurança descobriram quatro vulnerabilidades críticas nessa plataforma durante uma série de operações de equipes em Red em andamento usando o … Ler mais

Nevada closes state offices as cyberattack disrupts IT systems

Picus Blue Report 2025

Nevada remains two days into a cyberattack that began early Sunday, disrupting government websites, phone systems, and online platforms, and forcing all state offices to close on Monday. The impact of the attack was first felt on Sunday morning, with the Governor’s Technology Office stating that a ‘network issue’ began around 1:52 AM PT, affecting … Ler mais