Tag: advisory
-
Cisco Warns of Critical Privilege Escalation Vulnerability in Meeting Management Platform
Cisco has issued a security advisory regarding a critical privilege escalation vulnerability found in Cisco Meeting Management. The vulnerability is tied to the REST API component of the platform, and if exploited, it could allow an attacker to escalate their privileges from a low-level authenticated user to an administrator. First seen on thecyberexpress.com Jump to…
-
SonicWall Arbitrary OS Commands Execution Vulnerability Exploited in Attacks
Tags: advisory, attack, cve, cvss, cyber, exploit, incident response, security-incident, threat, update, vulnerabilityA critical vulnerability in SonicWall’s SMA1000 series tracked as CVE-2025-23006, has come under active exploitation by threat actors. SonicWall’s PSIRT (Product Security Incident Response Team) has issued an urgent advisory urging users to update their systems immediately to mitigate risks. Details of CVE-2025-23006 The vulnerability, which scores an alarming9.8/10on the CVSS v3 severity scale, stems from…
-
Cyber Safety Review Board axed in DHS cost-cutting move
Benjamine C. Huffman, acting secretary of the Department of Homeland Security under Trump, terminates the memberships for all DHS advisory committees, including the CSRB. First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366618188/Cyber-Safety-Review-Board-axed-in-DHS-cost-cutting-move
-
Cisco Warns of Meeting Management API Privilege Escalation Vulnerability
Cisco has issued a critical advisory regarding a privilege escalation vulnerability in its Meeting Management REST API. The flaw tracked as CVE-2025-20156, allows a remote, authenticated attacker with low privileges to elevate their access to administrator-level control on affected devices, posing a significant threat to affected systems. Vulnerability Details The vulnerability stems from improper authorization enforcement…
-
Trump ‘waved a white flag to Chinese hackers’ as Homeland Security axed cyber advisory boards
And: America ‘has never been less secure,’ retired rear admiral tells Congress First seen on theregister.com Jump to article: www.theregister.com/2025/01/22/dhs_axes_cyber_advisory_boards/
-
Trump ‘waved a white flag to Chinese hackers’ as DHS axed cyber advisory boards
‘The homeland has never been less secure,’ retired Rear Admiral tells Congress First seen on theregister.com Jump to article: www.theregister.com/2025/01/22/dhs_axes_cyber_advisory_boards/
-
Trump disbands Cyber Safety Review Board, Salt Typhoon inquiry in limbo
Tags: advisory, ai, attack, china, cisa, crowdstrike, cyber, cybersecurity, government, group, hacking, healthcare, incident, infrastructure, microsoft, network, ransomware, sbom, service, technology, threat, vulnerabilityThe administration of US President Donald Trump has dismissed all members of its Cyber Safety Review Board (CSRB), including those investigating the China-linked hacking group Salt Typhoon. Other groups affected by a general clear-out include the AI Safety and Security Board and the National Security Telecommunications Advisory Committee.Cybersecurity experts have expressed concern about the move,…
-
Trump administration disbands DHS board investigating Salt Typhoon hacks
Tags: advisory, ai, attack, china, cisa, crowdstrike, cyber, cybersecurity, government, group, hacking, healthcare, incident, infrastructure, microsoft, network, ransomware, sbom, service, technology, threat, vulnerabilityThe administration of US President Donald Trump has dismissed all members of its Cyber Safety Review Board (CSRB), including those investigating the China-linked hacking group Salt Typhoon. Other groups affected by a general clear-out include the AI Safety and Security Board and the National Security Telecommunications Advisory Committee.Cybersecurity experts have expressed concern about the move,…
-
DHS disbands existing advisory board memberships, raising questions about CSRB
The Cyber Safety Review Board was investigating the hacks of U.S.;telecom firms attributed to the Salt Typhoon threat group. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/dhs-disbands-advisory-board-csrb/737976/
-
Trump Terminates DHS Advisory Committee Memberships, Disrupting Cybersecurity Review
The new Trump administration has terminated all memberships of advisory committees that report to the Department of Homeland Security (DHS). “In alignment with the Department of Homeland Security’s (DHS) commitment to eliminating the misuse of resources and ensuring that DHS activities prioritize our national security, I am directing the termination of all current memberships on…
-
Trump administration dismisses members of all DHS advisory panels, including CSRB
The Department of Homeland Security has cleared all its advisory bodies, including the influential Cyber Safety Review Board, of current members, including experts from the private sector. It’s unclear what the panels’ future will be in the Trump administration.]]> First seen on therecord.media Jump to article: therecord.media/trump-dhs-removal-private-sector-members-advisory-boards
-
Trump administration removes private sector leaders from all DHS panels, including CSRB
A memo from the acting secretary of Homeland Security cleared all DHS advisory bodies, including the influential Cyber Safety Review Board, of members from the private sector. It’s unclear what their future will be in the Trump administration. ]]> First seen on therecord.media Jump to article: therecord.media/trump-dhs-removal-private-sector-members-advisory-boards
-
Trump Fires Cyber Safety Board Investigating Salt Typhoon Hackers
In a letter sent today, the acting DHS secretary terminated membership to all advisory boards, including the Cyber Safety Review Board (CSRB) tasked with investigating state-sponsored cyber threats against the US. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/trump-fires-cyber-safety-board-salt-typhoon-hackers
-
Three New ICS Advisories Released by CISA Detailing Vulnerabilities Mitigations
The Cybersecurity and Infrastructure Security Agency (CISA) announced three new Industrial Control Systems (ICS) advisories. These advisories provide critical insights into vulnerabilities impacting Traffic Alert and Collision Avoidance Systems (TCAS) II, Siemens SIMATIC S7-1200 CPUs, and ZF Roll Stability Support Plus (RSSPlus). Each advisory includes detailed technical descriptions of the vulnerabilities, associated CVEs, and recommended…
-
Critical Mozilla Vulnerabilities Prompt Urgent Updates for Firefox and Thunderbird Users
Mozilla Firefox and Thunderbird users are facing a series of high-severity vulnerabilities that could leave systems open to exploitation. The Indian Computer Emergency Response Team (CERT-In) issued an advisory on January 20, 2025, highlighting multiple security flaws in Mozilla’s popular browser and email client. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/cert-in-reports-mozilla-vulnerabilities/
-
7 top cybersecurity projects for 2025
Tags: access, advisory, ai, backup, best-practice, breach, business, cio, ciso, cloud, compliance, control, cyber, cybersecurity, data, data-breach, detection, encryption, framework, google, governance, infrastructure, intelligence, law, mitigation, monitoring, network, resilience, risk, risk-management, service, strategy, technology, threat, tool, vulnerabilityAs 2025 dawns, CISOs face the grim reality that the battle against cyberattackers never ends. Strong and carefully planned cybersecurity projects are the best way to stay a step ahead of attackers and prevent them gaining the upper hand.”Urgency is the mantra for 2025,” says Greg Sullivan, founding partner of cybersecurity services firm CIOSO Global.…
-
Yubico Warns of 2FA Security Flaw in pam-u2f for Linux and macOS Users
Tags: 2fa, advisory, authentication, cve, fido, flaw, linux, macOS, mfa, open-source, risk, software, threat, vulnerabilityYubico has released a security advisory, YSA-2025-01, which highlighted a vulnerability within the software module that supports two-factor authentication (2FA) for Linux and macOS platforms. This issue, tracked as CVE-2025-23013, allows for a partial 2FA bypass protections when using YubiKeys or other FIDO-compatible authenticators. The vulnerability poses a high-risk security threat and could potentially compromise…
-
Multiple HPE Aruba Network Vulnerabilities Allows Remote Arbitrary Code Execution
Hewlett Packard Enterprise (HPE) has confirmed multiple vulnerabilities in its Aruba Networking products that could allow remote arbitrary code execution. These vulnerabilities, CVE-2025-23051 and CVE-2025-23052, affect various versions of the AOS-8 and AOS-10 Operating Systems, specifically impacting Mobility Conductors, Controllers, and managed WLAN and SD-WAN Gateways. This advisory comes amid growing concerns within the cybersecurity…
-
Fortinet confirms zero-day flaw used in attacks against its firewalls
Fortinet has confirmed the existence of a critical authentication bypass vulnerability in specific versions of FortiOS firewalls and FortiProxy secure web gateways. The flaw has been exploited in the wild since early December in what appears to be an indiscriminate and widespread campaign, according to cybersecurity firm Arctic Wolf.The fix for this zero-day is part…
-
CVE-2024-55591: Fortinet Authentication Bypass Zero-Day Vulnerability Exploited in the Wild
Fortinet patched a zero day authentication bypass vulnerability in FortiOS and FortiProxy that has been actively exploited in the wild as a zero-day since November 2024. Background On January 14, Fortinet released a security advisory (FG-IR-24-535) addressing a critical severity vulnerability impacting FortiOS and FortiProxy. CVE Description CVSSv3 CVE-2024-55591 FortiOS and FortiProxy Authentication Bypass Vulnerability…
-
Beware cybersecurity tech that’s past its prime, 5 areas to check or retire
Tags: access, advisory, ai, antivirus, attack, authentication, breach, bug-bounty, ciso, cloud, control, credentials, cyberattack, cybersecurity, data, data-breach, defense, detection, encryption, endpoint, firewall, Hardware, network, password, penetration-testing, risk, router, siem, software, strategy, switch, threat, tool, vpn, vulnerability, waf, zero-trustCybersecurity leaders can choose from an ever-expanding list of digital tools to help them ward off attacks and, based on market projections, they’re implementing plenty of those options.Gartner predicts a 15% increase in cybersecurity spending for 2025, with global expenditures expected to reach $212 billion in the upcoming year. The research and consulting firm says…
-
Critical Infrastructure Urged to Scrutinize Product Security During Procurement
A joint government advisory has set out steps critical infrastructure firms should take to ensure any OT products they purchase are secure by design First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/critical-infrastructure-product/
-
Sicherheitsmängel gefährden DNA-Sequenziergeräte
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?quality=50&strip=all 5283w, b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=300%2C168&quality=50&strip=all 300w, b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=768%2C432&quality=50&strip=all 768w, b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=1024%2C576&quality=50&strip=all 1024w, b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=1536%2C864&quality=50&strip=all 1536w, b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=1240%2C697&quality=50&strip=all 1240w, b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=150%2C84&quality=50&strip=all 150w, b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=854%2C480&quality=50&strip=all 854w, b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=640%2C360&quality=50&strip=all 640w, b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: 1024px) 100vw, 1024px”>Security-Forscher haben festgestellt, dass bei einem DNA-Sequenziergerät wichtige Sicherheitsfunktionen fehlen. angellodeco Shutterstock.comDas DNA-Sequenziergerät iSeq 100 von Illumina wird von medizinischen Laboren auf der ganzen Welt für eine Vielzahl…
-
Ivanti Urges Patch for Flaws in Connect Secure, Policy Secure and ZTA Gateways
Ivanti has issued a critical security advisory addressing two vulnerabilities in its Connect Secure, Policy Secure, and ZTA Gateway products. First seen on hackread.com Jump to article: hackread.com/ivanti-patch-flaws-connect-secure-policy-secure-zta-gateways/
-
Ivanti zero-day exploited by APT group that previously targeted Connect Secure appliances
Researchers from Google’s Mandiant division believe the critical remote code execution vulnerability patched on Wednesday by software vendor Ivanti has been exploited since mid-December by a Chinese cyberespionage group. This is the same group that has exploited zero-day vulnerabilities in Ivanti Connect Secure appliances back in January 2024 and throughout the year.The latest attacks, exploiting…
-
Ivanti 0-Day Vulnerability Exploited in Wild-Patch Now
Ivanti released a critical security advisory addressing vulnerabilities in its Connect Secure, Policy Secure, and ZTA Gateways products. This advisory reveals the existence of two significant vulnerabilities, CVE-2025-0282 and CVE-2025-0283, which have been exploited in the wild, necessitating immediate action from users. Critical Vulnerability: CVE-2025-0282 CVE-2025-0282 is a stack-based buffer overflow vulnerability that affects Ivanti…
-
Ivanti warns critical RCE flaw in Connect Secure exploited as zero-day
Tags: advisory, apt, attack, authentication, cve, cvss, cybersecurity, data-breach, exploit, flaw, google, government, group, intelligence, Internet, ivanti, law, mandiant, microsoft, network, rce, remote-code-execution, risk, software, threat, tool, vpn, vulnerability, zero-dayIT software provider Ivanti released patches Wednesday for its Connect Secure SSL VPN appliances to address two memory corruption vulnerabilities, one of which has already been exploited in the wild as a zero-day to compromise devices.The exploited vulnerability, tracked as CVE-2025-0282, is a stack-based buffer overflow rated as critical with a CVSS score of 9.0.…

