Tag: open-source
-
Evilginx: Die nginx-Mutation, die MFA-Schutz aushebelt
Sicherheitsforscher von Sophos X-Ops haben die Funktionsweise und das Gefährdungspotenzial von Evilginx untersucht. Die auf dem weit verbreiteten Open-Source-Webserver nginx basierende Malware stellt eine erhebliche Bedrohung für die IT-Sicherheit dar, indem sie gezielte Adversary-in-the-Middle (AitM)-Angriffe ermöglicht und dabei sogar Multi-Faktor-Authentifizierung (MFA) aushebeln kann. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/evilginx-nginx-mutation-mfa-schutz
-
Open Source vs. proprietäre Software – Nur mit Offenheit gelingt digitale Souveränität in Europa
First seen on security-insider.de Jump to article: www.security-insider.de/open-source-vs-proprietaere-software-peter-ganten-erklaert-a-f5d165ae509d467b552c4dd5d0a58ca2/
-
Open-source malware doubles, data exfiltration attacks dominate
There’s been a notable shift in the types of threats targeting software developers, with a total of 17,954 open source malware packages identified in Q1 2025, according … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/04/03/open-source-malware-index-q1-2025/
-
Vulnerabilities Expose Jan AI Systems to Remote Manipulation
Vulnerabilities in open source ChatGPT alternative Jan AI expose systems to remote, unauthenticated manipulation. The post Vulnerabilities Expose Jan AI Systems to Remote Manipulation appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/vulnerabilities-expose-jan-ai-systems-to-remote-manipulation/
-
Mozilla is rolling Thundermail, a Gmail, Office 365 rival
Thunderbirds are Pro: Open-source email client to get message hosting, appointment scheduling, more First seen on theregister.com Jump to article: www.theregister.com/2025/04/02/thunderbird_pay_services/
-
Leitfaden von Flashpoint – Open Source Intelligence in der Praxis umsetzen
First seen on security-insider.de Jump to article: www.security-insider.de/digitale-gefahren-reale-folgen-osint-cyberangriffe-a-c892ad92f75c876b04fe1adae49f5b43/
-
Prince Ransomware An Automated Open-Source Ransomware Builder Freely Available on GitHub
Tags: attack, cyber, cybercrime, cybersecurity, exploit, github, healthcare, open-source, programming, ransomware, toolThe cybersecurity landscape has witnessed a concerning development with the emergence of >>Prince Ransomware,
-
CISA Alerts on Active Exploitation of Apache Tomcat Vulnerability
Tags: apache, cisa, cve, cyber, cybersecurity, exploit, flaw, infrastructure, open-source, risk, vulnerabilityThe Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert regarding the active exploitation of CVE-2025-24813, a critical vulnerability within Apache Tomcat. This newly identified flaw poses a significant risk to organizations using affected versions of the popular open-source web server. CVE-2025-24813: Apache Tomcat Path Equivalence Vulnerability CVE-2025-24813, classified as a >>Path Equivalence…
-
BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework
BlueToolkit is an open-source tool that helps find security flaws in Bluetooth Classic devices. It runs known and custom exploits to test if a device is vulnerable. Right now, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/04/02/bluetoolkit-open-source-bluetooth-classic-vulnerability-testing-framework/
-
Microsoft Using AI to Uncover Critical Bootloader Vulnerabilities
Using the Security Copilot tool, Microsoft discovered 20 critical vulnerabilities in widely deployed open-source bootloaders. The post Microsoft Using AI to Uncover Critical Bootloader Vulnerabilities appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/microsoft-using-ai-to-uncover-critical-bootloader-vulnerabilities/
-
Sliver Framework Customized Enhances Evasion and Bypasses EDR Detection
The Sliver Command & Control (C2) framework, an open-source tool written in Go, has been a popular choice for offensive security practitioners since its release in 2020. However, as detection mechanisms evolve, out-of-the-box Sliver payloads are increasingly flagged by Endpoint Detection and Response (EDR) solutions. Recent research demonstrates how minor yet strategic modifications to the…
-
Altgeräte bedrohen Sicherheit in Unternehmen
Tags: access, apache, authentication, botnet, bug, cisco, cloud, cve, cyberattack, dns, endpoint, firewall, Hardware, intelligence, Internet, ivanti, lazarus, linux, macOS, network, open-source, password, radius, ransomware, risk, router, sans, service, software, supply-chain, threat, update, vulnerabilitySchwachstellen in alten Netzwerkgeräten stellen ein erhebliches Sicherheitsrisiko für Unternehmen dar.Eine Analyse von Ciscos Threat-Intelligence-Team Talos zeigt, zwei der drei häufigsten Schwachstellen, auf die es Angreifer im Jahr 2024 abgesehen hatten, waren in alten Netzwerkgeräten zu finden. Das Problem ist, dass Hersteller dazu keine Patches mehr herausgeben.’Dies unterstreicht, wie wichtig es ist, veraltete Komponenten des…
-
Trend Micro Open Sources AI Tool Cybertron
The cybersecurity artificial intelligence (AI) model and agent will help organizations improve threat detection and incident response. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/trend-micro-cybertron-open-source-ai
-
Neuer JFrog-Bericht warnt vor Sicherheitslücken in der Software-Lieferkette im KI-Zeitalter
Der Bericht thematisiert zudem die mangelnde Transparenz der Code-Herkunft in der Software-Lieferkette. Viele Entwickler laden Open-Source-Pakete direkt aus öffentlichen Registries herunter, ohne Schwachstellen oder Risiken zu berücksichtigen. Weitere Themen umfassen die Herausforderungen durch die “Sicherheits-Tool-Ausuferung” und vieles mehr. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/neuer-jfrog-bericht-warnt-vor-sicherheitsluecken-in-der-software-lieferkette-im-ki-zeitalter/a40356/
-
6 hard-earned tips for leading through a cyberattack, from CSOs who’ve been there
Tags: attack, awareness, breach, business, cisco, ciso, control, cyber, cyberattack, cybersecurity, data, group, incident response, infosec, infrastructure, lessons-learned, military, open-source, phishing, phone, privacy, programming, ransomware, security-incident, service, skills, software, strategy, threat, training, updateDevelop muscle memory, and patience, through simulations: Authority under crisis is meaningless if you can’t establish followership. And this goes beyond the incident response team: CISOs must communicate with the entire organization, a commonly misunderstood imperative, says Pablo Riboldi, CISO of nearshore talent provider BairesDev.”I find that employee involvement tends to be overlooked during cyberattacks.…
-
Volume of attacks on network devices shows need to replace end of life devices quickly
Tags: access, apache, attack, authentication, best-practice, breach, cloud, control, credentials, cve, cyber, dns, endpoint, espionage, exploit, firewall, flaw, government, group, Hardware, infrastructure, injection, Internet, ivanti, lazarus, macOS, monitoring, network, north-korea, open-source, password, risk, router, russia, sans, service, software, threat, tool, update, vulnerabilityCVE-2023-1389, a vulnerability in TP-Link Archer AX21 router;CVE-2024-3400, a hole in Palo Alto Networks PAN-OS firewall operating system;CVE-2023-36845, a vulnerability in Juniper Networks Junos OS operating system;CVE-2021-44529, a vulnerability in Ivanti Endpoint Manager Cloud Service Appliance;CVE-2023-38035, a hole in Ivanti Sentry security gateway;CVE-2024-36401, a vulnerability in OSGeo GeoServer;CVE-2024-0012, a vulnerability in Palo Alto Neworks PAN-OS…
-
Open Source statt Microsoft – So können Unternehmen Linux-Server günstig und sicher aufsetzen
First seen on security-insider.de Jump to article: www.security-insider.de/open-source-und-linux-statt-windows-a-b4da32bf803c2dc7f035009a3c83d64b/
-
Microsoft uses AI to find flaws in GRUB2, U-Boot, Barebox bootloaders
Microsoft used its AI-powered Security Copilot to discover 20 previously unknown vulnerabilities in the GRUB2, U-Boot, and Barebox open-source bootloaders. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-uses-ai-to-find-flaws-in-grub2-u-boot-barebox-bootloaders/
-
Triton RAT Uses Telegram for Remote System Access and Control
Cado Security Labs has uncovered a new Python-based Remote Access Tool (RAT) named Triton RAT, which leverages Telegram for remote system access and data exfiltration. This open-source malware, available on GitHub, is designed to execute a wide range of malicious activities, including credential theft, system control, and persistence establishment. Technical Overview Triton RAT initiates its…
-
Exegol: Open-source hacking environment
Exegol is a community-driven hacking environment, which helps users deploy hacking setups quickly and securely. It’s made for penetration testers, CTF players, bug … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/31/exegol-open-source-hacking-environment/
-
Evilginx Tool (Still) Bypasses MFA
Based on the open source NGINX Web server, the malicious tool allows threat actors to steal user credentials and session tokens. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/evilginx-bypasses-mfa
-
Mit selbst programmiertem Tool wehrt sich ein Open-Source-Entwickler gegen KI-Scraper
First seen on t3n.de Jump to article: t3n.de/news/tool-open-source-entwickler-gegen-ki-scraper-1680507/
-
Cloudflare open sources OPKSSH to bring Single Sign-On to SSH
Tags: open-sourceOPKSSH (OpenPubkey SSH) makes it easy to authenticate to servers over SSH using OpenID Connect (OIDC), allowing developers to ditch manually configured SSH keys in favor of … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/28/opkssh-sso-ssh/
-
Exim UseFree Vulnerability Enables Privilege Escalation
A significant security threat has been uncovered in Exim, a popular open-source mail transfer agent (MTA) widely used in Linux distributions. Identified as CVE-2025-30232, this vulnerability allows for a potentially severe form of exploitation known as a use-after-free (UAF). This type of bug can lead to privilege escalation, posing substantial risks for administrators and users…
-
Hottest cybersecurity open-source tools of the month: March 2025
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Hetty: Open-source … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/27/hottest-cybersecurity-open-source-tools-of-the-month-march-2025/
-
CoffeeLoader: A Brew of Stealthy Techniques
IntroductionZscaler ThreatLabz has identified a new sophisticated malware family that we named CoffeeLoader, which originated around September 2024. The purpose of the malware is to download and execute second-stage payloads while evading detection by endpoint-based security products. The malware uses numerous techniques to bypass security solutions, including a specialized packer that utilizes the GPU, call…
-
Malicious npm Package Modifies Local ‘ethers’ Library to Launch Reverse Shell Attacks
Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another locally installed package, underscoring the continued evolution of software supply chain attacks targeting the open-source ecosystem.The packages in question are ethers-provider2 and ethers-providerz, with the former downloaded 73 times to date since it was published on First seen…

