Tag: advisory
-
Heightened Cyber Threat from Iran Sparks Urgent Calls for Vigilance and Mitigation
Following last week’s U.S. airstrikes targeting Iranian nuclear sites, cybersecurity experts and government officials are now warning of a possible digital retaliation, a surge in cyber threats originating from Iran. On June 22, the Department of Homeland Security (DHS) issued a National Terrorism Advisory System Bulletin warning of a >>heightened threat environment
-
Salt Typhoon Targets Telecoms via Router Flaws, Warn FBI and Canada
Salt Typhoon, a China-linked group, is exploiting router flaws to spy on global telecoms, warns a joint FBI and Canadian advisory issued in June 2025. First seen on hackread.com Jump to article: hackread.com/salt-typhoon-targets-telecoms-router-flaws-fbi-canada/
-
10 tough cybersecurity questions every CISO must answer
2. How can we achieve the right security balance for our company’s risk tolerance?: To play that consultative role, CISOs also need to ask and answer that question, says Vandy Hamidi, CISO of public accounting and advisory firm BPM.”My role is to reduce risk in a way that enables the business to operate confidently while…
-
BeyondTrust Tools RCE Vulnerability Allows Attackers Execute Arbitrary Code
Tags: access, advisory, cve, cyber, cybersecurity, flaw, injection, rce, remote-code-execution, tool, vulnerabilityA newly disclosed vulnerability in BeyondTrust’s Remote Support (RS) and Privileged Remote Access (PRA) products has raised alarms across the cybersecurity community. The flaw, tracked as CVE-2025-5309 and detailed in advisory BT25-04, allows attackers to execute arbitrary code on affected servers via a Server-Side Template Injection (SSTI) vulnerability in the chat feature. With a CVSSv4…
-
‘Grafana Ghost’ XSS flaw exposes 47,000 servers to account takeover
From open-redirect to plugin-powered takeover: Based on the PoC shared by OX Security, the exploit leverages a clever combo of client-side path traversal and open-redirect mechanics in Grafana’s staticHandler, the component responsible for serving static files like HTML, CSS, JavaScript, and images from the server to the user’s browser.A potential attack can have a crafted…
-
Cyber-Zwischenfall bei einer Fluggesellschaft in Kanada
Advisory: Cybersecurity incident First seen on westjet.com Jump to article: www.westjet.com/en-ca/news/2025/advisory–cybersecurity-incident-
-
CISA Reveals ‘Pattern’ of Ransomware Attacks Against SimpleHelp RMM
A new Cybersecurity and Infrastructure Security Agency (CISA) advisory warned ransomware actors have been actively exploiting a critical SimpleHelp flaw since January. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/cisa-ransomware-attacks-simplehelp-rmm
-
Cyberattacks top list of global business concerns, Kroll finds
Many companies feel unprepared to comply with global privacy and security rules, according to the advisory firm’s annual business sentiment survey. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/business-cyber-risks-concerns-ai-kroll/750672/
-
Unpatched IT Tool Opens Door Hackers Breach Billing Software Firm via SimpleHelp RMM
Tags: advisory, breach, business, cyber, cybersecurity, hacker, infrastructure, monitoring, ransomware, software, tool, vulnerabilityCybersecurity professionals and business leaders are on high alert following a confirmed breach of a utility billing software provider, traced to unpatched vulnerabilities in the widely used SimpleHelp Remote Monitoring and Management (RMM) platform. The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory warning that ransomware actors have leveraged these security gaps…
-
Ransomware Gang Exploits SimpleHelp RMM to Compromise Utility Billing Firm
A CISA advisory urged all software vendors and downstream customers to check if they are impacted by unpatched versions of the SimpleHelp RMM tool First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ransomware-simplehelp-compromise/
-
Updated Response to CISA Advisory (AA23-352A): #StopRansomware: Play Ransomware
AttackIQ has released an updated attack graph in response to the recently revised CISA Advisory (AA23-352A) which disseminates Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) associated with the Play Ransomware group, identified through FBI investigations as recently as May 2025. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/updated-response-to-cisa-advisory-aa23-352a-stopransomware-play-ransomware/
-
Apple fixes new iPhone zero-day bug used in Paragon spyware hacks
The iPhone maker quietly updated a February security advisory to publicize a flaw that was used to hack at least two journalists in Europe. First seen on techcrunch.com Jump to article: techcrunch.com/2025/06/12/apple-fixes-new-iphone-zero-day-bug-used-in-paragon-spyware-hacks/
-
Apache CloudStack Flaw Allows Attackers to Execute Privileged Actions
Apache CloudStack, a leading open-source cloud management platform, has announced the immediate availability of new Long-Term Support (LTS) releases”, version 4.19.3.0 and 4.20.1.0″, to address multiple critical security vulnerabilities. The advisory, published by PMC member Pearl Dsilva on June 10, 2025, highlights five distinct vulnerabilities, two of which are rated critical and pose significant risks…
-
The State of Identity Security with Morey Haber
At RSAC Conference 2025, BeyondTrust’s Chief Security Advisor Morey Haber offered a forward-looking take on the state of identity security and the real-world gaps that still exist in enterprise environments. With over two decades in the field and a perspective shaped by both hands-on roles and high-level advisory work, Haber emphasized what too many organizations..…
-
Multiple QNAP Flaws Allow Remote Attackers to Hijack User Accounts
QNAP has issued a security advisory warning users of Qsync Central about two critical vulnerabilities that could allow attackers to access sensitive data or execute malicious code. The affected software is widely used for synchronizing files across QNAP NAS devices and connected clients. Below is a comprehensive analysis of the vulnerabilities, their technical details, and…
-
Jenkins Gatling Plugin Flaw Allows CSP Bypass, Exposing Systems to Attack
On June 6, 2025, the Jenkins Project issued a security advisory (SECURITY-3588 / CVE-2025-5806) affecting the Gatling Plugin, a widely used tool for displaying performance test reports within the Jenkins automation server. The vulnerability carries a high severity rating, with CVSS base scores ranging from 8.0 to 9.0 across different versions, indicating a significant risk…
-
FBI Issues Play Ransomware Security Advisory Mitigation Steps to Take Now
The Play ransomware group has hit about 900 organizations globally so far and uses “double extortion” after data theft. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-play-ransomware-fbi-security-advisory/
-
Play ransomware group hit 900 organizations since 2022
A joint advisory from the US and Australian authorities states that Play ransomware has hit approximately 900 organizations over the past three years. A joint advisory from the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) states that Play ransomware has hit…
-
VMware NSX XSS Vulnerability Exposes Systems to Malicious Code Injection
Broadcom has issued a high-severity security advisory (VMSA-2025-0012) for VMware NSX, addressing three newly discovered stored Cross-Site Scripting (XSS) vulnerabilities: CVE-2025-22243, CVE-2025-22244, and CVE-2025-22245. These vulnerabilities impact the NSX Manager UI, gateway firewall, and router port components, exposing organizations to potential code injection attacks if left unpatched. The vulnerabilities, all stemming from improper input validation,…
-
Critical Cisco Nexus Dashboard Vulnerability Lets Attackers Impersonate Managed Devices
Cisco has issued a high-severity security advisory (ID: cisco-sa-ndfc-shkv-snQJtjrp) regarding a critical SSH host key validation vulnerability in its Nexus Dashboard Fabric Controller (NDFC), tracked as CVE-2025-20163. The flaw, assigned a CVSS 3.1 base score of 8.7, could allow unauthenticated, remote attackers to impersonate Cisco NDFC-managed devices, posing significant risks to data center infrastructure. The…
-
Cisco Alerts Users to Critical ISE Vulnerability Exposing Sensitive Data
Cisco has issued a critical security advisory (Advisory ID: cisco-sa-ise-aws-static-cred-FPMjUcm7) for its Identity Services Engine (ISE) when deployed on major cloud platforms”, Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI). The vulnerability, tracked as CVE-2025-20286 and classified under CWE-259 (Use of Hard-coded Password), carries a CVSS v3.1 base score of 9.9, indicating…
-
FBI: Play ransomware breached 900 victims, including critical orgs
In an update to a joint advisory with CISA and the Australian Cyber Security Centre, the FBI said that the Play ransomware gang had breached roughly 900 organizations as of May 2025, three times the number of victims reported in October 2023. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-play-ransomware-breached-900-victims-including-critical-orgs/
-
HPE StoreOnce Faces Critical CVE-2025-37093 Vulnerability, Urges Immediate Patch Upgrade
Hewlett Packard Enterprise (HPE) has issued a new security advisory addressing eight newly discovered vulnerabilities in its StoreOnce data backup and deduplication platform. Among these, the most severe is an authentication bypass vulnerability tracked as CVE-2025-37093, which carries a near-maximum CVSS score of 9.8, indicating a critical risk to affected systems. First seen on thecyberexpress.com…
-
6 ways CISOs can leverage data and AI to better secure the enterprise
Tags: advisory, ai, antivirus, attack, automation, breach, business, ciso, cloud, compliance, computer, corporate, cyber, cyberattack, cybersecurity, data, detection, firewall, framework, governance, guide, infrastructure, LLM, login, ml, network, programming, risk, risk-analysis, service, siem, soc, software, technology, threat, tool, trainingEmphasize the ‘learning’ part of ML: To be truly effective, models need to be retrained with new data to keep up with changing threat vectors and shifting cyber criminal behavior.”Machine learning models get smarter with your help,” Riboldi says. “Make sure to have feedback loops. Letting analysts label events and adjust settings constantly improves their…

