Tag: open-source
-
Novel Phishing Attack Combines AES With Poisoned npm Packages
Researchers discovered a phishing attack in the wild that takes multiple well-tread technologies like open source packages and AES encryption and combines them. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/novel-phishing-attack-combines-aes-npm-packages
-
Trojanized KeePass opens doors for ransomware attackers
A suspected initial access broker has been leveraging trojanized versions of the open-source KeePass password manager to set the stage for ransomware attacks, WithSecure … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/20/trojanized-keepass-keeloader-ransomware/
-
The Windows Subsystem for Linux goes open source
Microsoft has officially open-sourced the Windows Subsystem for Linux (WSL), closing the very first issue ever filed on the Microsoft/WSL GitHub repository: “Will this be open … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/20/microsoft-wsl-open-sourced/
-
CISA Adds Actively Exploited Ivanti EPMM Zero-Day to KEV Catalog
Tags: authentication, cisa, cve, cyber, cybersecurity, endpoint, exploit, flaw, infrastructure, ivanti, kev, mobile, open-source, remote-code-execution, vulnerability, zero-dayCybersecurity and Infrastructure Security Agency (CISA) has added two critical zero-day vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The flaws CVE-2025-4427 and CVE-2025-4428 enable authentication bypass and remote code execution, respectively, and stem from insecure implementations of widely used open-source…
-
Containers are just processes: The illusion of namespace security
In the early days of commercial open source, major vendors cast doubt on its security, claiming transparency was a flaw. In fact, that openness fueled strong communities and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/20/containers-namespaces-security/
-
Ethical hackers exploited zero-day vulnerabilities against popular OS, browsers, VMs and AI frameworks
Virtual machine and container escapes: Virtualization sits at the core of public cloud infrastructure and private data centers, allowing companies to run their workloads and applications inside isolated containers or virtual servers. Any flaw that allows escaping from the confines of a virtual machine or a Linux container poses a risk not only to the…
-
Beyond Auth0: A Comprehensive Guide to Authentication Alternatives in 2025
Struggling with Auth0’s pricing or technical limitations? This comprehensive guide analyzes the top commercial and open-source authentication alternatives for 2025, helping you select the perfect solution based on your specific technical requirements, deployment preferences, and budget constraints. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/beyond-auth0-a-comprehensive-guide-to-authentication-alternatives-in-2025/
-
New Malware on PyPI Poses Threat to Open-Source Developers
Malicious dbgpkg package on PyPI poses as a debugging utility but acts as a delivery mechanism for a stealthy backdoor First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/malware-pypi-threat-open-source/
-
Microsoft open-sources Windows Subsystem for Linux at Build 2025
Microsoft has open-sourced the Windows Subsystem for Linux (WSL), making its source code available on GitHub, except for a few components that are part of Windows. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-open-sources-windows-subsystem-for-linux-at-build-2025/
-
Open MPIC: The open-source path to secure Multi-Perspective Issuance Corroboration
Open MPIC is an open-source framework designed to help Certificate Authorities (CAs) meet new Multi-Perspective Issuance Corroboration (MPIC) requirements from the CA/Browser Forum. Developed with contributions from Princeton and Sectigo, it helps mitigate BGP hijack risks through globally distributed validation, quorum logic, and flexible deployment options. Open MPIC is a practical, evolving solution that advances…
-
Hanko: Open-source authentication and user management
Hanko is an open-source, API-first authentication solution purpose-built for the passwordless era. >>We focus on helping developers and organizations modernize their … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/19/hanko-open-source-authentication-user-management/
-
Threat Actors Exploit Open Source Packages to Deploy Malware in Supply Chain Attacks
The Socket Threat Research Team has uncovered a surge in supply chain attacks where threat actors weaponize open source software libraries to deliver malicious payloads such as infostealers, remote shells, and cryptocurrency drainers. With modern development heavily reliant on ecosystems like npm, PyPI, Go Module, Maven Central, and RubyGems where 7090% of codebases consist of…
-
Ivanti patches two zero-days under active attack as intel agency warns customers
Vendor says vulns are linked with 2 mystery open source libraries integrated into EPMM product First seen on theregister.com Jump to article: www.theregister.com/2025/05/14/ivanti_patches_two_zerodays_and/
-
Stratoshark geht an die Wireshark-Foundation
Sysdig gab bekannt, dass das Unternehmen sein Open-Source-Cloud-Forensik-Tool Stratoshark der Wireshark-Foundation spendet. Diese Spende unterstreicht das Engagement von Sysdig, Innovationen innerhalb der Community zu fördern, offen zu gestalten und die Sicherheit mit fortschrittlichen Tools voranzutreiben, die Cloud-native Umgebungen besser verstehen. Der Beitrag von Sysdig umfasst den Quellcode von Stratoshark, einschließlich des Codes für die Schnittstellen…
-
Weaponized PyPI Package Targets Developers to Steal Source Code
Security researchers at RL have discovered a malicious Python package called >>solana-token
-
Cerbos: Open-source, scalable authorization solution
Cerbos is an open-source solution designed to simplify and modernize access control for cloud-native, microservice-based applications. Instead of hardcoding authorization … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/14/cerbos-open-source-scalable-authorization-solution/
-
CVE-2025-4427, CVE-2025-4428: Ivanti Endpoint Manager Mobile (EPMM) Remote Code Execution
Tags: access, advisory, api, attack, authentication, cve, endpoint, exploit, flaw, ivanti, mobile, open-source, programming, rce, remote-code-execution, software, vulnerability, waf, zero-dayRemote code execution vulnerability in a popular mobile device management solution from Ivanti has been exploited in the wild in limited attacks Background On May 13, Ivanti released a security advisory to address a high severity remote code execution (RCE) and a medium severity authentication bypass vulnerability in its Endpoint Manager Mobile (EPMM) product, a…
-
Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)
Attackers have exploited vulnerabilities in open-source libraries to compromise on-prem Ivanti Endpoint Manager Mobile (EPMM) instances of a >>very limited
-
Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)
Attackers have exploited vulnerabilities in open-source libraries to compromise on-prem Ivanti Endpoint Manager Mobile (EPMM) instances of a >>very limited
-
Hackers Weaponize KeePass Password Manager to Spread Malware and Steal Passwords
Tags: attack, cyber, exploit, hacker, incident response, infection, malware, open-source, password, threatThreat actors have successfully exploited the widely-used open-source password manager, KeePass, to spread malware and facilitate large-scale password theft. The attack, which was reported by WithSecure’s Incident Response team, involved modifying and re-signing KeePass installers with trusted certificates to deliver a custom malware loader dubbed KeeLoader. Malware Delivery Through KeePass The infection chain began with…
-
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures
Tags: access, api, apt, attack, authentication, backdoor, backup, breach, business, china, cloud, control, cve, cyber, data, data-breach, detection, dns, encryption, endpoint, espionage, exploit, finance, firewall, fortinet, google, government, group, infection, infrastructure, intelligence, Internet, ivanti, linux, malicious, malware, mandiant, military, network, open-source, programming, rat, remote-code-execution, reverse-engineering, risk, rust, sap, service, strategy, tactics, threat, tool, update, vmware, vpn, vulnerability, windows, zero-dayExecutive Summary EclecticIQ analysts assess with high confidence that, in April 2025, China-nexus nation-state APTs (advanced persistent threat) launched high-temp exploitation campaigns against critical infrastructure networks by targeting SAP NetWeaver Visual Composer. Actors leveraged CVE-2025-31324 [1], an unauthenticated file upload vulnerability that enables remote code execution (RCE). This assessment is based on a publicly…
-
Hackers Abuse PyInstaller to Deploy Stealthy macOS Infostealer
Jamf Threat Labs has identified a novel macOS infostealer that exploits PyInstaller, a legitimate open-source tool used to bundle Python scripts into standalone Mach-O executables. This marks the first documented instance of PyInstaller being weaponized to deploy infostealers on macOS, highlighting a sophisticated evolution in the tactics of cybercriminals targeting Apple’s ecosystem. Discovered in April…
-
RISC-V Captivates Cryptosphere Following Vitalik’s Endorsement of EVM Replacement
Tags: open-sourceWhat is RISC-V? If you’d put that question to the cryptosphere a week ago, 90% of them would have responded with a shrug. Ask the same question today and there’s a good chance you’ll get some semblance of an informed response. Perhaps something to do with it being a superior VM whose open-source design and…
-
Hugging Face Acquires Pollen Robotics for Open-Source Reachy 2
Hugging Face acquires Pollen Robotics to democratize robotics with open-source designs. Discover how this impacts innovation and accessibility in AI! First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/hugging-face-acquires-pollen-robotics-for-open-source-reachy-2/
-
Open Source Linux Firewall IPFire 2.29 Core Update 194 Released: What’s New!
IPFire, the powerful open-source firewall, has unveiled its latest release, IPFire 2.29 Core Update 194, packed with security enhancements, performance improvements, and new features to safeguard networks of all sizes. Renowned for its robust feature set, IPFire continues to deliver a secure, high-performance platform focused on usability and reliability. It’s been a month since […]…
-
âš¡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
What do a source code editor, a smart billboard, and a web server have in common? They’ve all become launchpads for attacks”, because cybercriminals are rethinking what counts as “infrastructure.” Instead of chasing high-value targets directly, threat actors are now quietly taking over the overlooked: outdated software, unpatched IoT devices, and open-source packages. It’s not…

