<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2025-02-10T19:06:16Z</updated>
  <generator>https://yabu.me</generator>

  <title>Nostr notes by Not Simon 🐐</title>
  <author>
    <name>Not Simon 🐐</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://yabu.me/npub14g0mj0fmn0sepfuhp2wupyk7d8xyz7rezpmrx2gfsav9vxlwxypq4xznd6.rss" />
  <link href="https://yabu.me/npub14g0mj0fmn0sepfuhp2wupyk7d8xyz7rezpmrx2gfsav9vxlwxypq4xznd6" />
  <id>https://yabu.me/npub14g0mj0fmn0sepfuhp2wupyk7d8xyz7rezpmrx2gfsav9vxlwxypq4xznd6</id>
  <icon>https://media.infosec.exchange/infosec.exchange/accounts/avatars/110/730/368/199/044/452/original/7719fd04768b65ec.png</icon>
  <logo>https://media.infosec.exchange/infosec.exchange/accounts/avatars/110/730/368/199/044/452/original/7719fd04768b65ec.png</logo>




  <entry>
    <id>https://yabu.me/nevent1qqsv6vnhld3zl04dl8ryt0676n98aszshkxcz3eevme8af77y07vacczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyeqs6em</id>
    
      <title type="html">Happy #PatchTuesday from **Google Chrome**: [Stable Channel ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv6vnhld3zl04dl8ryt0676n98aszshkxcz3eevme8af77y07vacczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyeqs6em" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsrjyymghy4y0fsf4p6frj7fkcscddt6rt3n8nja6yvp5cdyyw237gfs3ufx&#39;&gt;nevent1q…3ufx&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Happy #PatchTuesday from **Google Chrome**: [Stable Channel Update for Desktop](&lt;a href=&#34;https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html&#34;&gt;https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html&lt;/a&gt; )&lt;br/&gt;Chrome 133.0.6943.98/.99 for Windows, Mac and 133.0.6943.98 for Linux has 4 security fixes, all 4 were externally reported:&amp;lt;li&amp;gt;CVE-2025-0995 (high) Use after free in V8&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;CVE-2025-0996 (high) Inappropriate implementation in Browser UI&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;CVE-2025-0997 (high) Use after free in Navigation&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;CVE-2025-0998 (high) Out of bounds memory access in V8&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;No mention of [exploitation](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;#chrome #google #cve #vulnerability #infosec #cybersecurity
    </content>
    <updated>2025-02-12T19:07:26Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrjyymghy4y0fsf4p6frj7fkcscddt6rt3n8nja6yvp5cdyyw237gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyn8tru5</id>
    
      <title type="html">Happy #PatchTuesday from **CrowdStrike**: [CVE 2025-1146 - ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrjyymghy4y0fsf4p6frj7fkcscddt6rt3n8nja6yvp5cdyyw237gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyn8tru5" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsdde0mssqjz80pnczhtey9r68tdyvzsrpa2kc5mwm2sefzcmr62tgsr2dge&#39;&gt;nevent1q…2dge&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Happy #PatchTuesday from **CrowdStrike**: [CVE 2025-1146 - CrowdStrike Falcon Sensor for Linux TLS Issue](&lt;a href=&#34;https://www.crowdstrike.com/security-advisories/cve-2025-1146/&#34;&gt;https://www.crowdstrike.com/security-advisories/cve-2025-1146/&lt;/a&gt; )&lt;br/&gt;[CVE-2025-1146](&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2025-1146&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2025-1146&lt;/a&gt; ) CrowdStrike Falcon Sensor for Linux TLS Issue:&lt;br/&gt;&lt;br/&gt;&amp;gt; CrowdStrike uses industry-standard TLS (transport layer security) to secure communications from the Falcon sensor to the CrowdStrike cloud. CrowdStrike has identified a validation logic error in the Falcon sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor where our TLS connection routine to the CrowdStrike cloud can incorrectly process server certificate validation. This could allow an attacker with the ability to control network traffic to potentially conduct a man-in-the-middle (MiTM) attack.&lt;br/&gt;&lt;br/&gt;&amp;gt; CrowdStrike has no indication of any exploitation of this issue in the wild.&lt;br/&gt;&lt;br/&gt;I want to note that ClownStrike does not have a date or timestamp on their security advisory. 🤡 h/t:  &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1s6eewzr2zvz3ppsa6k8j2hadamsug7q4rp068wmz3grtf440xxkqr8n008&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;cR0w :cascadia: :gayint: 🏴‍☠️&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1s6e…n008&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;&lt;br/&gt;&lt;br/&gt;#crowdstrike #crowdstrikefalcon #CVE_2025_1146 #cve #vulnerability #infosec #cybersecurity
    </content>
    <updated>2025-02-12T19:04:52Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdde0mssqjz80pnczhtey9r68tdyvzsrpa2kc5mwm2sefzcmr62tgzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsynpth90</id>
    
      <title type="html">**Assetnote**: [Nginx/Apache Path Confusion to Auth Bypass in ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdde0mssqjz80pnczhtey9r68tdyvzsrpa2kc5mwm2sefzcmr62tgzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsynpth90" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspwmr37jv6r728zstdxfgl7jrqx6sn49umz999q5rju9zc88hs5ecw8vn4j&#39;&gt;nevent1q…vn4j&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;**Assetnote**: [Nginx/Apache Path Confusion to Auth Bypass in PAN-OS (CVE-2025-0108)](&lt;a href=&#34;https://www.assetnote.io/resources/research/nginx-apache-path-confusion-to-auth-bypass-in-pan-os&#34;&gt;https://www.assetnote.io/resources/research/nginx-apache-path-confusion-to-auth-bypass-in-pan-os&lt;/a&gt; )&lt;br/&gt;If I&amp;#39;m reading this correctly, Assetnote dropped vulnerability details and proof of concept for [CVE-2025-0108](&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2025-0108&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2025-0108&lt;/a&gt; ) (CVSSv4: 8.8 high) PAN-OS: Authentication Bypass in the Management Web Interface. They are describing this as a zero-day auth bypass, but it should be called &amp;#34;patch bypass.&amp;#34; See related PAN [security advisory](&lt;a href=&#34;https://security.paloaltonetworks.com/CVE-2025-0108&#34;&gt;https://security.paloaltonetworks.com/CVE-2025-0108&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;Fun operational mistake: Assetnote wrote This vulnerability was fixed in versions xx and yy and assigned CVE zz. in their conclusion.&lt;br/&gt;&lt;br/&gt;#paloaltonetworks #CVE_2025_0108 #infosec #vulnerability #cve #cybersecurity #poc #proofofconcept
    </content>
    <updated>2025-02-12T18:35:46Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspwmr37jv6r728zstdxfgl7jrqx6sn49umz999q5rju9zc88hs5eczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyrd30fy</id>
    
      <title type="html">Happy #PatchTuesday from **Palo Alto Networks** (LIKELY ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspwmr37jv6r728zstdxfgl7jrqx6sn49umz999q5rju9zc88hs5eczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyrd30fy" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsta6machs67cwwggqupvrmdmqheapujtv8p6xsa5sqkry55e40lsq92tzyv&#39;&gt;nevent1q…tzyv&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Happy #PatchTuesday from **Palo Alto Networks** (LIKELY ZERO-DAYS):&lt;br/&gt;(Note: PAN likes to downplay severity by showing the base &#43; threat metrics CVSSv4 score. I listed base score only) &amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://security.paloaltonetworks.com/CVE-2025-0113&amp;#34&#34;&gt;https://security.paloaltonetworks.com/CVE-2025-0113&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-0113&amp;lt;/a&amp;gt; (CVSSv4.0: 7.6 high) Cortex XDR Broker VM: Unauthorized Access to Broker VM Docker Containers&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://security.paloaltonetworks.com/CVE-2025-0112&amp;#34&#34;&gt;https://security.paloaltonetworks.com/CVE-2025-0112&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-0112&amp;lt;/a&amp;gt; (CVSSv4: 6.8 medium) Cortex XDR Agent: Local Windows User Can Disable the Agent&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://security.paloaltonetworks.com/CVE-2025-0110&amp;#34&#34;&gt;https://security.paloaltonetworks.com/CVE-2025-0110&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-0110&amp;lt;/a&amp;gt; (CVSSv4.0: 8.6 high) PAN-OS OpenConfig Plugin: Command Injection Vulnerability in OpenConfig Plugin&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Exploit Maturity: POC 🤔&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://security.paloaltonetworks.com/PAN-SA-2025-0005&amp;#34&#34;&gt;https://security.paloaltonetworks.com/PAN-SA-2025-0005&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;PAN-SA-2025-0005&amp;lt;/a&amp;gt; GlobalProtect Clientless VPN: Same-Origin Policy Does Not Apply When Using Clientless VPN&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://security.paloaltonetworks.com/PAN-SA-2025-0004&amp;#34&#34;&gt;https://security.paloaltonetworks.com/PAN-SA-2025-0004&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;PAN-SA-2025-0004&amp;lt;/a&amp;gt; Chromium: Monthly Vulnerability Update (February 2025) (multiple CVEs)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://security.paloaltonetworks.com/CVE-2025-0109&amp;#34&#34;&gt;https://security.paloaltonetworks.com/CVE-2025-0109&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-0109&amp;lt;/a&amp;gt; (CVSSv4: 6.9 medium) PAN-OS: Unauthenticated File Deletion Vulnerability on the Management Web Interface&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Exploit Maturity: POC 🤔&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://security.paloaltonetworks.com/CVE-2025-0111&amp;#34&#34;&gt;https://security.paloaltonetworks.com/CVE-2025-0111&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-0111&amp;lt;/a&amp;gt; (7.1 high) PAN-OS: Authenticated File Read Vulnerability in the Management Web Interface&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;&amp;gt; Palo Alto Networks is not aware of any malicious exploitation of this issue.&lt;br/&gt;&lt;br/&gt;My new concern is whether I should say #zeroday for CVE-2025-0110 and 0109. Based on the First criteria for Exploit Maturity:&lt;br/&gt;&lt;br/&gt;&amp;gt; Based on threat intelligence sources each of the following must apply:&amp;lt;li&amp;gt;Proof-of-concept is publicly available&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;No knowledge of reported attempts to exploit this vulnerability&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;No knowledge of publicly available solutions used to simplify attempts to exploit the vulnerability&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;#paloaltonetworks #infosec #vulnerability #cve #cybersecurity #poc #proofofconcept
    </content>
    <updated>2025-02-12T17:49:45Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsta6machs67cwwggqupvrmdmqheapujtv8p6xsa5sqkry55e40lsqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyvtfeuu</id>
    
      <title type="html">Happy #PatchTuesday with **GitLab**: [GitLab Patch Release: ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsta6machs67cwwggqupvrmdmqheapujtv8p6xsa5sqkry55e40lsqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyvtfeuu" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2n9grxk7z7n7dxfc9dpsz5hx2kcespm7te6eqmg6z057wc728zccuxqx9r&#39;&gt;nevent1q…qx9r&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Happy #PatchTuesday with **GitLab**: [GitLab Patch Release: 17.8.2, 17.7.4, 17.6.5](&lt;a href=&#34;https://about.gitlab.com/releases/2025/02/12/patch-release-gitlab-17-8-2-released/&#34;&gt;https://about.gitlab.com/releases/2025/02/12/patch-release-gitlab-17-8-2-released/&lt;/a&gt; )&lt;br/&gt;8 CVEs (1 high severity, 7 medium). At a *glance*, no mention of [exploitation](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;#gitlab #cve #vulnerability #infosec #cybersecurity
    </content>
    <updated>2025-02-12T12:36:02Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2n9grxk7z7n7dxfc9dpsz5hx2kcespm7te6eqmg6z057wc728zcczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyzmmgk6</id>
    
      <title type="html">RE: Fortinet&amp;#39;s CVE-2024-24472 **Bleeping Computer**: ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2n9grxk7z7n7dxfc9dpsz5hx2kcespm7te6eqmg6z057wc728zcczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyzmmgk6" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs9x6wvvu0lm6lej4726l3dhjjvunsjms9p74y7ppkhdgzmq3p5ces6d4d8a&#39;&gt;nevent1q…4d8a&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;RE: Fortinet&amp;#39;s CVE-2024-24472 &lt;br/&gt;**Bleeping Computer**: [Fortinet discloses second firewall auth bypass patched in January](&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/&#34;&gt;https://www.bleepingcomputer.com/news/security/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/&lt;/a&gt; )&lt;br/&gt;&lt;br/&gt;&amp;gt; Update 2/11/25 07:32 PM ET: After publishing our story, Fortinet has informed us that the new CVE-2025-24472 flaw added to FG-IR-24-535 today is not a zero-day and was already fixed in January.&lt;br/&gt;&lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1s6eewzr2zvz3ppsa6k8j2hadamsug7q4rp068wmz3grtf440xxkqr8n008&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;cR0w :cascadia: :gayint: 🏴‍☠️&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1s6e…n008&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; I called it 💪 Not a zero-day.&lt;br/&gt;&lt;br/&gt;#fortinet #cve #infosec #cybersecurity #vulnerability
    </content>
    <updated>2025-02-12T03:36:29Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9x6wvvu0lm6lej4726l3dhjjvunsjms9p74y7ppkhdgzmq3p5ceszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy7tlqh8</id>
    
      <title type="html">subtoot about Fortinet zero-day. Those infosec publications are ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9x6wvvu0lm6lej4726l3dhjjvunsjms9p74y7ppkhdgzmq3p5ceszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy7tlqh8" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2x8vy2e9pq2l78dnndu93qud50tqvq9gttmy07v8ecprsmr8n4fq6nrffa&#39;&gt;nevent1q…rffa&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;subtoot about Fortinet zero-day. Those infosec publications are running WILD calling it an exploited zero-day (complete with a backstory) with absolutely no evidence. Are we reading the same security advisory? What the fuck are you guys conjuring up and extrapolating from 2025-02-11: Added CVE-2025-24472 and its acknowledgement?&lt;br/&gt;&lt;br/&gt;EDIT: You&amp;#39;ve heard of &amp;#34;patch-diffing.&amp;#34; Get ready for *advisory-diffing*:&lt;br/&gt;&lt;a href=&#34;https://web.archive.org/web/20250114161659/https://fortiguard.fortinet.com/psirt/FG-IR-24-535&#34;&gt;https://web.archive.org/web/20250114161659/https://fortiguard.fortinet.com/psirt/FG-IR-24-535&lt;/a&gt; (14 January 2025)&lt;br/&gt;versus &lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-535&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-535&lt;/a&gt; (11 February 2025):&amp;lt;li&amp;gt;An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy may allow a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module &amp;lt;code&amp;gt;or via crafted CSF proxy requests.&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Follow the recommended upgrade path using our tool at: &amp;lt;del&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://docs.fortinet.com/upgrade-tool&amp;#34&#34;&gt;https://docs.fortinet.com/upgrade-tool&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34; translate=&amp;#34;no&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;invisible&amp;#34;&amp;gt;&lt;a href=&#34;https://&amp;lt;/span&amp;gt;&amp;lt;span&#34;&gt;https://&amp;lt;/span&amp;gt;&amp;lt;span&lt;/a&gt; class=&amp;#34;&amp;#34;&amp;gt;docs.fortinet.com/upgrade-tool&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;invisible&amp;#34;&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;/del&amp;gt; &amp;lt;code&amp;gt;&lt;a href=&#34;https://docs.fortinet.com/upgrade-tool&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Please&#34;&gt;https://docs.fortinet.com/upgrade-tool&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Please&lt;/a&gt; note that the above IP parameters are &amp;lt;del&amp;gt;under attacker control and therefore can be any other IP address.&amp;lt;/del&amp;gt; &amp;lt;code&amp;gt;not the actual source IP addresses of the attack traffic, they are generated arbitrarily by the attacker as a parameter. Because of this they should not be used for any blocking.&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;edit 2set intf &amp;#34;&amp;lt;del&amp;gt;all&amp;lt;/del&amp;gt;&amp;lt;code&amp;gt;any&amp;lt;/code&amp;gt;&amp;#34;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;code&amp;gt;Please note as well that an attacker needs to know an admin account&amp;#39;s username to perform the attack and log in the CLI. Therefore, having a non-standard and non-guessable username for admin accounts does offer some protection, and is, in general, a best practice. Keep in mind however that the targeted websocket not being an authentication point, nothing would prevent an attacker from bruteforcing the username.&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;code&amp;gt;CSF requests issue:&amp;lt;/code&amp;gt;&amp;lt;code&amp;gt;Disable Security Fabric from the CLI:&amp;lt;/code&amp;gt;&amp;lt;code&amp;gt;Config system csf&amp;lt;/code&amp;gt;&amp;lt;code&amp;gt;Set status disable&amp;lt;/code&amp;gt;&amp;lt;code&amp;gt;end&amp;lt;/code&amp;gt;&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;Some of these are explained in the changelog, but I wanted to be certain.
    </content>
    <updated>2025-02-11T23:27:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv4qjntggtjnk83hwa24u75alg3n6ascvcyevmur30ryj3kqa9c9gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyrkpcd5</id>
    
      <title type="html">**Wiz**: [How Wiz found a Critical NVIDIA AI vulnerability: Deep ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv4qjntggtjnk83hwa24u75alg3n6ascvcyevmur30ryj3kqa9c9gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyrkpcd5" />
    <content type="html">
      **Wiz**: [How Wiz found a Critical NVIDIA AI vulnerability:  Deep Dive into a container escape (CVE-2024-0132)](&lt;a href=&#34;https://www.wiz.io/blog/nvidia-ai-vulnerability-deep-dive-cve-2024-0132&#34;&gt;https://www.wiz.io/blog/nvidia-ai-vulnerability-deep-dive-cve-2024-0132&lt;/a&gt; )&lt;br/&gt;This is an update to a previous blog post from [26 September 2024](&lt;a href=&#34;https://www.wiz.io/blog/wiz-research-critical-nvidia-ai-vulnerability&#34;&gt;https://www.wiz.io/blog/wiz-research-critical-nvidia-ai-vulnerability&lt;/a&gt; ). Wiz provides vulnerability details for [CVE-2024-0132](&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2024-0132&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2024-0132&lt;/a&gt; ) (**9.0 critical**) NVIDIA Container Toolkit 1.16.1 or earlier TOCTOU (hehe funny acronym &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1s6eewzr2zvz3ppsa6k8j2hadamsug7q4rp068wmz3grtf440xxkqr8n008&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;cR0w :cascadia: :gayint: 🏴‍☠️&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1s6e…n008&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;) which can lead to &amp;#34;code execution, denial of service, escalation of privileges, information disclosure, and data tampering.&amp;#34;&lt;br/&gt;&lt;br/&gt;&amp;gt; We withheld specific technical details of the vulnerability because the NVIDIA PSIRT team identified that the original patch did not fully resolve the issue. We worked closely with the NVIDIA team to ensure proper mitigation of both the original vulnerability and the bypass. The bypass is tracked under a separate CVE, &amp;gt; [&amp;gt; CVE-2025-23359](&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2025-23359&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2025-23359&lt;/a&gt; )&amp;gt; .&lt;br/&gt;&lt;br/&gt;#nvidia #cve #vulnerability #CVE_2024_0132 #CVE_2025_23359 #infosec #cybersecurity
    </content>
    <updated>2025-02-11T19:39:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2x8vy2e9pq2l78dnndu93qud50tqvq9gttmy07v8ecprsmr8n4fqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsywlx3qa</id>
    
      <title type="html">Happy #PatchTuesday: Exploited **Fortinet** zero-day??? ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2x8vy2e9pq2l78dnndu93qud50tqvq9gttmy07v8ecprsmr8n4fqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsywlx3qa" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsr6jg6qmxxghk9lh7mnznkuvzr75ay3zu385mtsw7fc2nxw2hd3dgtshjxf&#39;&gt;nevent1q…hjxf&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Happy #PatchTuesday: Exploited **Fortinet** zero-day??? [FG-IR-24-535](&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-535&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-535&lt;/a&gt; )&lt;br/&gt;CVE-2025-24472 (8.1 high) Authentication bypass in Node.js websocket module and CSF requests&lt;br/&gt;If this security advisory looks familiar, that&amp;#39;s because it belongs to the previous Fortinet exploited zero-day [CVE-2024-55591](&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2024-55591&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2024-55591&lt;/a&gt; ) (**9.6 critical**) . This was tacked onto the same advisory, with no context other than the changelog:&lt;br/&gt;&lt;br/&gt;&amp;gt; 2025-02-11: Added CVE-2025-24472 and its acknowledgement&lt;br/&gt;&lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1pkrnqz97z2wckgmwglckccgg65eanvw3wpvuses7npqlvv6st06svz6763&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;BleepingComputer&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1pkr…6763&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; seems to think it is: [Fortinet warns of new zero-day exploited to hijack firewalls](&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-zero-day-exploited-to-hijack-firewalls/&#34;&gt;https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-zero-day-exploited-to-hijack-firewalls/&lt;/a&gt; ) but I&amp;#39;m skeptical.&lt;br/&gt;&lt;br/&gt;#fortinet #infosec #CVE_2024_55591 #vulnerability #cve #CVE_2025_24472 #cybersecurity #eitw #activeexploitation #zeroday
    </content>
    <updated>2025-02-11T19:31:08Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsr6jg6qmxxghk9lh7mnznkuvzr75ay3zu385mtsw7fc2nxw2hd3dgzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy9yhn4v</id>
    
      <title type="html">**CISA**: [CISA Adds Four Known Exploited Vulnerabilities to ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsr6jg6qmxxghk9lh7mnznkuvzr75ay3zu385mtsw7fc2nxw2hd3dgzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy9yhn4v" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs87ttyg4l0nm8l7m98tm594lpe3854l5va9recty4ww948m62v64gaf49d9&#39;&gt;nevent1q…49d9&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;**CISA**: [CISA Adds Four Known Exploited Vulnerabilities to Catalog](&lt;a href=&#34;https://www.cisa.gov/news-events/alerts/2025/02/11/cisa-adds-four-known-exploited-vulnerabilities-catalog&#34;&gt;https://www.cisa.gov/news-events/alerts/2025/02/11/cisa-adds-four-known-exploited-vulnerabilities-catalog&lt;/a&gt; )&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2025-21418&amp;#34&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2025-21418&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-21418&amp;lt;/a&amp;gt; (7.8 high) Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2025-21391&amp;#34&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2025-21391&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-21391&amp;lt;/a&amp;gt; (7.1 high) Microsoft Windows Storage Link Following Vulnerability&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2024-40890&amp;#34&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2024-40890&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2024-40890&amp;lt;/a&amp;gt; (8.8 high) Zyxel DSL CPE OS Command Injection Vulnerability&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2024-40891&amp;#34&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2024-40891&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2024-40891&amp;lt;/a&amp;gt; (8.8 high) Zyxel DSL CPE OS Command Injection Vulnerability&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;The Zyxel stuff is not new, but since the Microsoft zero-days are part of #PatchTuesday, I&amp;#39;m including them in this conversation.&lt;br/&gt;&lt;br/&gt;#cisa #kev #cisakev #KnownExploitedVulnerabilitiesCatalog #vulnerability #zeroday #eitw #activeexploitation #infosec #cybersecurity #cve
    </content>
    <updated>2025-02-11T19:21:23Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs87ttyg4l0nm8l7m98tm594lpe3854l5va9recty4ww948m62v64gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsymzccmc</id>
    
      <title type="html">Happy #PatchTuesday from **Adobe**: &amp;lt;li&amp;gt;&amp;lt;a ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs87ttyg4l0nm8l7m98tm594lpe3854l5va9recty4ww948m62v64gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsymzccmc" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqszz8k3rd3qww2wucd5aesnttd87t5ruet2d86n4pq9eryweqavysqypxjc2&#39;&gt;nevent1q…xjc2&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Happy #PatchTuesday from **Adobe**: &amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://helpx.adobe.com/security/products/indesign/apsb25-01.html&amp;#34&#34;&gt;https://helpx.adobe.com/security/products/indesign/apsb25-01.html&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;APSB25-01&amp;lt;/a&amp;gt; Security Update Available for Adobe InDesign (7 CVEs)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://helpx.adobe.com/security/products/magento/apsb25-08.html&amp;#34&#34;&gt;https://helpx.adobe.com/security/products/magento/apsb25-08.html&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;APSB25-08&amp;lt;/a&amp;gt; Security update available for Adobe Commerce (31)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://helpx.adobe.com/security/products/substance3d_stager/apsb25-09.html&amp;#34&#34;&gt;https://helpx.adobe.com/security/products/substance3d_stager/apsb25-09.html&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;APSB25-09&amp;lt;/a&amp;gt; Security updates available for Substance 3D Stager (1)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://helpx.adobe.com/security/products/incopy/apsb25-10.html&amp;#34&#34;&gt;https://helpx.adobe.com/security/products/incopy/apsb25-10.html&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;APSB25-10&amp;lt;/a&amp;gt; Security Update Available for Adobe InCopy (1)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://helpx.adobe.com/security/products/illustrator/apsb25-11.html&amp;#34&#34;&gt;https://helpx.adobe.com/security/products/illustrator/apsb25-11.html&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;APSB25-11&amp;lt;/a&amp;gt; Security Updates Available for Adobe Illustrator (3)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://helpx.adobe.com/security/products/substance3d_designer/apsb25-12.html&amp;#34&#34;&gt;https://helpx.adobe.com/security/products/substance3d_designer/apsb25-12.html&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;APSB25-12&amp;lt;/a&amp;gt; Security updates available for Substance 3D Designer (1)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://helpx.adobe.com/security/products/photoshop_elements/apsb25-13.html&amp;#34&#34;&gt;https://helpx.adobe.com/security/products/photoshop_elements/apsb25-13.html&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;APSB25-13&amp;lt;/a&amp;gt; Security updates available for Adobe Photoshop Elements (1)&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;&amp;gt; Adobe is not aware of any exploits in the wild for any of the issues addressed in these updates.&lt;br/&gt;&lt;br/&gt;#adobe #cve #indesign #photoshop #incopy #vulnerability #infosec #cybersecurity
    </content>
    <updated>2025-02-11T18:27:49Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszz8k3rd3qww2wucd5aesnttd87t5ruet2d86n4pq9eryweqavysqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyagsvc8</id>
    
      <title type="html">Happy #PatchTuesday from **Microsoft**: 4 ZERO-DAYS (2 EXPLOITED) ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszz8k3rd3qww2wucd5aesnttd87t5ruet2d86n4pq9eryweqavysqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyagsvc8" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8r5zwfxgqpxkq2qnjrg7qgm3cj39r0mmw69rmrayrvgm0v2zpg9cy0guq7&#39;&gt;nevent1q…guq7&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Happy #PatchTuesday from **Microsoft**: 4 ZERO-DAYS (2 EXPLOITED) out of 56 new CVEs&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21377&amp;#34&#34;&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21377&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-21377&amp;lt;/a&amp;gt; (6.5 medium) NTLM Hash Disclosure Spoofing Vulnerability (PUBLICLY DISCLOSED)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21194&amp;#34&#34;&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21194&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-21194&amp;lt;/a&amp;gt; (7.1 high) Microsoft Surface Security Feature Bypass Vulnerability (PUBLICLY DISCLOSED)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21418&amp;#34&#34;&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21418&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-21418&amp;lt;/a&amp;gt; (7.8 high) Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability (&amp;lt;strong&amp;gt;EXPLOITED&amp;lt;/strong&amp;gt;)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21391&amp;#34&#34;&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21391&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-21391&amp;lt;/a&amp;gt; (7.1 high) Windows Storage Elevation of Privilege Vulnerability (&amp;lt;strong&amp;gt;EXPLOITED&amp;lt;/strong&amp;gt;)&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;#microsoft #zeroday #cve #eitw #activeexploitation #vulnerability #infosec #cybersecurity
    </content>
    <updated>2025-02-11T18:07:12Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8r5zwfxgqpxkq2qnjrg7qgm3cj39r0mmw69rmrayrvgm0v2zpg9czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyafr2eu</id>
    
      <title type="html">Happy #PatchTuesday from **Fortinet**: &amp;lt;li&amp;gt;&amp;lt;a ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8r5zwfxgqpxkq2qnjrg7qgm3cj39r0mmw69rmrayrvgm0v2zpg9czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyafr2eu" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs04dc33n7dfy65pr3aqahq8pkwwlgyluk5asgpu998dqjmse0zwns5hcg8g&#39;&gt;nevent1q…cg8g&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Happy #PatchTuesday from **Fortinet**: &amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-422&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-422&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FG-IR-24-422&amp;lt;/a&amp;gt; CVE-2024-52966 (2.3 low) Disclosure of Logs of Devices not belonging to the Current ADOM from Log View&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-23-261&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-23-261&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FG-IR-23-261&amp;lt;/a&amp;gt; CVE-2023-40721 (6.7 medium) FortiOS / FortiProxy / FortiPAM / FortiSwitchManager - Format string vulnerability in CLI commands&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-300&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-300&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FG-IR-24-300&amp;lt;/a&amp;gt; CVE-2024-52968 (6.7 medium) Improper Authentication in FortiMonitor Agent&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-23-279&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-23-279&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FG-IR-23-279&amp;lt;/a&amp;gt; CVE-2024-40586 (6.7 medium) Improper access control to FortiSslvpnNamedPipe&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-311&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-311&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FG-IR-24-311&amp;lt;/a&amp;gt; CVE-2024-40585 (6.5 medium) Insertion of sensitive information into Event log&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-063&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-063&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FG-IR-24-063&amp;lt;/a&amp;gt; CVE-2024-27781 (7.1 high) Multiple Reflected and Stored Cross-Site Scripting&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-147&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-147&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FG-IR-24-147&amp;lt;/a&amp;gt; CVE-2024-36508 (6.0 medium) Multiple arbitrary file deletion in the CLI&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-438&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-438&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FG-IR-24-438&amp;lt;/a&amp;gt; CVE-2024-50567 and CVE-2024-50569 (7.2 high) OS Command Injections&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-220&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-220&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FG-IR-24-220&amp;lt;/a&amp;gt; CVE-2024-40584 (7.2 high) OS command injection in external connector&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-25-015&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-25-015&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FG-IR-25-015&amp;lt;/a&amp;gt; CVE-2025-24470 (8.6 high) Off-by-slash vulnerability in Nginx config&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-302&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-302&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FG-IR-24-302&amp;lt;/a&amp;gt; CVE-2024-40591 (8.8 high) Permission escalation due to an Improper Privilege Management&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-23-324&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-23-324&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FG-IR-23-324&amp;lt;/a&amp;gt; CVE-2024-27780 (3.1 low) Reflected XSS (cross site scripting) in incident page&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-160&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-160&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FG-IR-24-160&amp;lt;/a&amp;gt; CVE-2024-35279 (8.1 high) Stack buffer overflow in fabric service&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-094&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-094&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FG-IR-24-094&amp;lt;/a&amp;gt; CVE-2024-33504 (4.1 medium) Use of Hard-coded Cryptographic Key to encrypt sensitive data&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;Fortinet downplays the CVSSv3.1 score by listing temporal only, I have listed base score instead. No mention of [exploitation](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;#fortinet #fortios #fortiproxy #fortiswitchmanager #cve #vulnerability #infosec #cybersecurity
    </content>
    <updated>2025-02-11T17:45:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs04dc33n7dfy65pr3aqahq8pkwwlgyluk5asgpu998dqjmse0zwnszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyrf7cee</id>
    
      <title type="html">Happy #PatchTuesday from **Ivanti**: [February Security ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs04dc33n7dfy65pr3aqahq8pkwwlgyluk5asgpu998dqjmse0zwnszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyrf7cee" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsydmlr3furfztjm5sq0qsp0h8uwdlyg2wq3dvrumxnn8l0rfrw77g0xxghk&#39;&gt;nevent1q…xghk&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Happy #PatchTuesday from **Ivanti**: [February Security Update](&lt;a href=&#34;https://www.ivanti.com/blog/february-security-update&#34;&gt;https://www.ivanti.com/blog/february-security-update&lt;/a&gt; )&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Services-Application-CSA-CVE-2024-47908-CVE-2024-11771?language=en_US&amp;#34&#34;&gt;https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Services-Application-CSA-CVE-2024-47908-CVE-2024-11771?language=en_US&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Security Advisory Ivanti Cloud Services Application (CSA) (CVE-2024-47908, CVE-2024-11771)&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-MDM-N-MDM?language=en_US&amp;#34&#34;&gt;https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-MDM-N-MDM?language=en_US&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;N-MDM - Security Advisory Ivanti Neurons for MDM (N-MDM)&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs?language=en_US&amp;#34&#34;&gt;https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs?language=en_US&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;February Security Advisory Ivanti Connect Secure (ICS),Ivanti Policy Secure (IPS) and Ivanti Secure Access Client (ISAC) (Multiple CVEs)&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;&amp;gt; We are not aware of any customers being exploited by these vulnerabilities prior to public disclosure. These vulnerabilities were disclosed through our responsible disclosure program.  &lt;br/&gt;&lt;br/&gt;#Ivanti #ivantiCSA #neurons #connectsecure #cve #vulnerability #infosec #cybersecurity
    </content>
    <updated>2025-02-11T15:23:29Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqpdguq9d98g5ax6vnj29qfmu9qgmt5ycgysvym9dhmnkcqdphqqczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyrg2787</id>
    
      <title type="html">**ElecticIQ**: [Sandworm APT Targets Ukrainian Users with ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqpdguq9d98g5ax6vnj29qfmu9qgmt5ycgysvym9dhmnkcqdphqqczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyrg2787" />
    <content type="html">
      **ElecticIQ**: [Sandworm APT Targets Ukrainian Users with Trojanized Microsoft KMS Activation Tools in Cyber Espionage Campaigns](&lt;a href=&#34;https://blog.eclecticiq.com/sandworm-apt-targets-ukrainian-users-with-trojanized-microsoft-kms-activation-tools-in-cyber-espionage-campaigns&#34;&gt;https://blog.eclecticiq.com/sandworm-apt-targets-ukrainian-users-with-trojanized-microsoft-kms-activation-tools-in-cyber-espionage-campaigns&lt;/a&gt; )&lt;br/&gt;EclecticIQ analysts assess with high confidence that Sandworm (APT44), a threat actor supporting Russia&amp;#39;s Main Intelligence Directorate (GRU), is actively conducting a cyber espionage campaign against Ukrainian Windows users. Likely ongoing since late 2023, following Russia&amp;#39;s invasion of Ukraine, Sandworm leverages pirated Microsoft Key Management Service (KMS) activators and fake Windows updates to deliver a new version of BACKORDER, a loader previously associated with the group. BACKORDER ultimately deploys Dark Crystal RAT (DcRAT), enabling attackers to exfiltrate sensitive data and conduct cyber espionage.&lt;br/&gt;&lt;br/&gt;Multiple pieces of evidence strongly link this campaign to Sandworm, also tracked by CERT-UA as UAC-0145, based on recurring use of ProtonMail accounts in WHOIS records, overlapping infrastructure, and consistent Tactics, Techniques and Procedures (TTPs). Additionally, the reuse of BACKORDER, DcRAT, and TOR network mechanisms, along with debug symbols referencing a Russian-language build environment, further reinforce confidence in Sandworm&amp;#39;s involvement. Yara and Sigma rules, and Indicators of Compromise are listed.&lt;br/&gt;&lt;br/&gt;#russia #sandworm #apt44 #gru #threatintel #IOC #yara #sigma #malwareanalysis #infosec #cybersecurity #cti #cyberthreatintelligence
    </content>
    <updated>2025-02-11T14:38:53Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsydmlr3furfztjm5sq0qsp0h8uwdlyg2wq3dvrumxnn8l0rfrw77gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyxhu844</id>
    
      <title type="html">Happy #PatchTuesday from **SolarWinds**:&amp;lt;li&amp;gt;&amp;lt;a ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsydmlr3furfztjm5sq0qsp0h8uwdlyg2wq3dvrumxnn8l0rfrw77gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyxhu844" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsrrl3ha22fk4cpd2ynwnvjt7ffan0yd4pzck58veuc73xv5h5hqjsewnq4h&#39;&gt;nevent1q…nq4h&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Happy #PatchTuesday from **SolarWinds**:&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.solarwinds.com/trust-center/security-advisories/cve-2024-45718&amp;#34&#34;&gt;https://www.solarwinds.com/trust-center/security-advisories/cve-2024-45718&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Sensitive data disclosure vulnerability (CVE-2024-45718)&amp;lt;/a&amp;gt; 4.6 medium&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.solarwinds.com/trust-center/security-advisories/cve-2024-52611&amp;#34&#34;&gt;https://www.solarwinds.com/trust-center/security-advisories/cve-2024-52611&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;SolarWinds Platform Information Disclosure Vulnerability (CVE-2024-52611)&amp;lt;/a&amp;gt; 3.5 low&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.solarwinds.com/trust-center/security-advisories/cve-2024-52606&amp;#34&#34;&gt;https://www.solarwinds.com/trust-center/security-advisories/cve-2024-52606&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;SolarWinds Platform Server-Side Request Forgery Vulnerability (CVE-2024-52606)&amp;lt;/a&amp;gt; 3.5 low&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;No mention of [exploitation](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;#solarwinds #cve #vulnerability
    </content>
    <updated>2025-02-11T14:31:59Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrrl3ha22fk4cpd2ynwnvjt7ffan0yd4pzck58veuc73xv5h5hqjszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsym5m0h2</id>
    
      <title type="html">Happy Patch Tuesday to those still suffering. All new security ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrrl3ha22fk4cpd2ynwnvjt7ffan0yd4pzck58veuc73xv5h5hqjszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsym5m0h2" />
    <content type="html">
      Happy Patch Tuesday to those still suffering. All new security advisories from today will be posted under this toot as a conversation.
    </content>
    <updated>2025-02-11T12:32:01Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsg0ytjp5hd8cpr0t0uer7vr3mq6klawcqnnun809sk0nav9q0jl8szyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsynaf0jp</id>
    
      <title type="html">**APPLE ZERO-DAY**: [About the security content of iPadOS ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsg0ytjp5hd8cpr0t0uer7vr3mq6klawcqnnun809sk0nav9q0jl8szyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsynaf0jp" />
    <content type="html">
      **APPLE ZERO-DAY**: [About the security content of iPadOS 17.7.5](&lt;a href=&#34;https://support.apple.com/en-us/122173&#34;&gt;https://support.apple.com/en-us/122173&lt;/a&gt; ) ; [About the security content of iOS 18.3.1 and iPadOS 18.3.1](&lt;a href=&#34;https://support.apple.com/en-us/122174&#34;&gt;https://support.apple.com/en-us/122174&lt;/a&gt; )&lt;br/&gt;CVE-2025-24200 (score pending) A physical attack may disable USB Restricted Mode on a locked device. An authorization issue was addressed with improved state management. h/t:  &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub17m3jdhdfp3jttex4e5tdqnf46ev739v4fv0f889guvr4gw88eamqgj7tnu&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;ApplSec&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub17m3…7tnu&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;br/&gt;&lt;br/&gt;&amp;gt; Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.&lt;br/&gt;&lt;br/&gt;#apple #zeroday #vulnerability #CVE_2025_24200 #eitw #activeexploitation #infosec #cybersecurity
    </content>
    <updated>2025-02-10T18:39:56Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswq7vq28chd5dps8sjdnmffpy9cptqjslyxqhmpefxft9y0rth8xszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsya9cjyn</id>
    
      <title type="html">**Sucuri**: [Google Tag Manager Skimmer Steals Credit Card Info ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswq7vq28chd5dps8sjdnmffpy9cptqjslyxqhmpefxft9y0rth8xszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsya9cjyn" />
    <content type="html">
      **Sucuri**: [Google Tag Manager Skimmer Steals Credit Card Info From Magento Site](&lt;a href=&#34;https://blog.sucuri.net/2025/02/google-tag-manager-skimmer-steals-credit-card-info-from-magento-site.html&#34;&gt;https://blog.sucuri.net/2025/02/google-tag-manager-skimmer-steals-credit-card-info-from-magento-site.html&lt;/a&gt; )&lt;br/&gt;Title is straightforward: Sucuri warns of credit card data theft from a customer&amp;#39;s Magento-based eCommerce website. The credit card skimmer malware is delivered by leveraging Google Tag Manager (GTM). GTM is a free tool from Google that allows website owners to manage and deploy marketing tags on their website without needing to modify the site’s code directly. A single malicious domain is identified, but the real IOC is the GTM identifier GTM-MLHK2N68. The Hacker News identified at least [three sites infected with the skimmer](&lt;a href=&#34;https://thehackernews.com/2025/02/hackers-exploit-google-tag-manager-to.html&#34;&gt;https://thehackernews.com/2025/02/hackers-exploit-google-tag-manager-to.html&lt;/a&gt; ). &lt;br/&gt;&lt;br/&gt;#magento #threatintel #ioc #infosec #cybersecurity #cyberthreatintelligence #CTI
    </content>
    <updated>2025-02-10T16:45:50Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrcaulwqeqz4gn5desn8aqyqcqwuam0tzppestukgly75fay5w3ygzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy2m8qlh</id>
    
      <title type="html">**Zimbra** security advisory ~03 February 2025: [Zimbra ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrcaulwqeqz4gn5desn8aqyqcqwuam0tzppestukgly75fay5w3ygzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy2m8qlh" />
    <content type="html">
      **Zimbra** security advisory ~03 February 2025: [Zimbra Collaboration Daffodil 10.0.12 Patch Release](&lt;a href=&#34;https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.12#Security_Fixes&#34;&gt;https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.12#Security_Fixes&lt;/a&gt; )&lt;br/&gt;This is a reason why change logs and timelines are important for security advisories: Zimbra supposedly released this on 17 December 2024. Yet the CVEs have a publish date of 03 February 2025. Open source reporting are only coming out *today*.&lt;br/&gt;&lt;br/&gt;Only 3 out of 5 vulnerabilities have CVEs. Since they didn&amp;#39;t provide a CVSS score, CISA as an ADP scored [CVE-2025-25064](&lt;a href=&#34;https://cve.org/CVERecord?id=CVE-2025-25064&#34;&gt;https://cve.org/CVERecord?id=CVE-2025-25064&lt;/a&gt; ) SQL injection vulnerability as **9.8 critical**.&lt;br/&gt;&lt;br/&gt;Why you should care about patching: Zimbra Collaboration Suite has **nine** CVEs on the KEV Catalog, with four of them allowing for unauthenticated code execution. CVE-2025-25064 is more likely to get exploited than other vulnerabilities.&lt;br/&gt;&lt;br/&gt;#zimbra #zcs #cve_2025_25064 #vulnerability #cve #infosec #cybersecurity
    </content>
    <updated>2025-02-10T15:04:30Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv0jqu446vcq23mpszelw6uyrsqptmxrh7c4v49psrhxv4fyrlh2szyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyekspgt</id>
    
      <title type="html">I swear to god, if they deployed godzilla post-exploitation ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv0jqu446vcq23mpszelw6uyrsqptmxrh7c4v49psrhxv4fyrlh2szyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyekspgt" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs23ew4q8k8f7el5820k55nzq2ztrx8cmqymdmajjh5l6qajafv3kc6jyem4&#39;&gt;nevent1q…yem4&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I swear to god, if they deployed godzilla post-exploitation framework I&amp;#39;m going to blow up China.
    </content>
    <updated>2025-02-07T18:25:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsg2y5xklwv60jhznf9zryx6r96et9qqh22ulmv6rrfej6pz5vefwqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy5cnhzh</id>
    
      <title type="html">**CISA**: [CISA Adds One Known Exploited Vulnerability to ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsg2y5xklwv60jhznf9zryx6r96et9qqh22ulmv6rrfej6pz5vefwqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy5cnhzh" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8csv7haw5pry7ufy7fqkvatqj007w38gdc8xuz9mze89ua3e9cyq4wmedw&#39;&gt;nevent1q…medw&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;**CISA**: [CISA Adds One Known Exploited Vulnerability to Catalog](&lt;a href=&#34;https://www.cisa.gov/news-events/alerts/2025/02/07/cisa-adds-one-known-exploited-vulnerability-catalog&#34;&gt;https://www.cisa.gov/news-events/alerts/2025/02/07/cisa-adds-one-known-exploited-vulnerability-catalog&lt;/a&gt; )&lt;br/&gt;[CVE-2025-0994](&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2025-0994&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2025-0994&lt;/a&gt; ) (8.6 high) Trimble Cityworks Deserialization Vulnerability&lt;br/&gt;&lt;br/&gt;cc: &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1p03fezkj06uy70fp8d4vvmlcgl47grjl8rxk4hs5vkn2l0zuu3jsczq09v&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Glenn 📎&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1p03…q09v&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; rare Friday KEV&lt;br/&gt;&lt;br/&gt;#cisa #cisakev #kev #eitw #zeroday #vulnerability #trimble #cityworks #activeexploitation #infosec #cybersecurity #KnownExploitedVulnerabilitiesCatalog
    </content>
    <updated>2025-02-07T18:19:11Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv4fgcvak98mxerk9d64t0qdt4xugsfnw0gfny5ctfvnmmqklkvjszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsys3rtzn</id>
    
      <title type="html">ASEC&amp;#39;s appears to be the closest and I&amp;#39;m trying to ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv4fgcvak98mxerk9d64t0qdt4xugsfnw0gfny5ctfvnmmqklkvjszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsys3rtzn" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsxrc3eft7q8w7qxnlmrg7gvy0f8lyec2slqdu0a5k6qwk8c706zyq2mlrxt&#39;&gt;nevent1q…lrxt&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;ASEC&amp;#39;s appears to be the closest and I&amp;#39;m trying to determine if Godzilla (web shell) and Godzilla (post-exploitation framework) are one and the same. &lt;br/&gt;&lt;br/&gt;This is the web shell version &lt;a href=&#34;https://github.com/BeichenDream/Godzilla&#34;&gt;https://github.com/BeichenDream/Godzilla&lt;/a&gt; frequently referenced.&lt;br/&gt;&lt;br/&gt;Interestingly &amp;#34;19d87910d1a7ad9632161fd9dd6a54c8a059a64fc5f5a41cf5055cd37ec0499d&amp;#34; from Microsoft isn&amp;#39;t hot yet on VirusTotal
    </content>
    <updated>2025-02-07T14:24:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8csv7haw5pry7ufy7fqkvatqj007w38gdc8xuz9mze89ua3e9cyqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyut4qe3</id>
    
      <title type="html">EXPLOITED ZERO-DAY: **CISA**: [Trimble ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8csv7haw5pry7ufy7fqkvatqj007w38gdc8xuz9mze89ua3e9cyqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyut4qe3" />
    <content type="html">
      EXPLOITED ZERO-DAY: **CISA**: [Trimble Cityworks](&lt;a href=&#34;https://www.cisa.gov/news-events/ics-advisories/icsa-25-037-04&#34;&gt;https://www.cisa.gov/news-events/ics-advisories/icsa-25-037-04&lt;/a&gt; )&lt;br/&gt;Now that it&amp;#39;s public, I can confirm that [CVE-2025-0994](&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2025-0994&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2025-0994&lt;/a&gt; ) (7.2 high) remote code execution is an exploited zero-day. Quoting Trimble [internal communication](&lt;a href=&#34;https://learn.assetlifecycle.trimble.com/i/1532182-cityworks-customer-communication-2025-02-05-docx/0&#34;&gt;https://learn.assetlifecycle.trimble.com/i/1532182-cityworks-customer-communication-2025-02-05-docx/0&lt;/a&gt;? ):&lt;br/&gt;&lt;br/&gt;&amp;gt; These changes address a recently discovered vulnerability enabling an external actor to exploit a deserialization vulnerability for remote code execution (RCE) against a customer&amp;#39;s Microsoft Internet Information Services (IIS) web server&lt;br/&gt;&lt;br/&gt;Indicators of compromise are on page 2 of the Trimble communication page* (thanks &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1s69ytgd44h8539aftjc83pfc8w6w35gnmqqje6n42wqkvkepdwcs7mrmen&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Catalin Cimpanu&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1s69…rmen&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;)&lt;br/&gt;&lt;br/&gt;#threatintel #zeroday #trimble #cityworks #activeexploitation #eitw #CVE_2025_0994 #infosec #cybersecurity #cyberthreatintelligence #vulnerability #CTI
    </content>
    <updated>2025-02-06T15:42:20Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspywcc8hqfvhkvl72sq93257quqjhf7q0fv554yyp23j6x7s985rqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyzx9053</id>
    
      <title type="html">**Cisco** security advisories (PatchTuesday-ishing ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspywcc8hqfvhkvl72sq93257quqjhf7q0fv554yyp23j6x7s985rqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyzx9053" />
    <content type="html">
      **Cisco** security advisories (PatchTuesday-ishing &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1fuxdy7gwxn4tv8jg0jmyvjl3uegynyjmhf5ljngf0fs72cmedatstyvvx6&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;shellsharks&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1fux…vvx6&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;):&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34&amp;#34&#34;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Vulnerabilities&amp;lt;/a&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;CVE-2024-20184 (6.5 medium) Cisco Secure Email Gateway and Cisco Secure Web Appliance Command Injection Vulnerability&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;CVE-2024-20185 (3.1 low) Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance Privilege Escalation Vulnerability&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-range-bypass-2BsEHYSu&amp;#34&#34;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-range-bypass-2BsEHYSu&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Cisco Secure Web Appliance Range Request Bypass Vulnerability&amp;lt;/a&amp;gt; CVE-2025-20183 (5.8 medium)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW&amp;#34&#34;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Cisco IOS, IOS XE, and IOS XR Software SNMP Denial of Service Vulnerabilities&amp;lt;/a&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175, CVE-2025-20176 (7.7 high) Cisco IOS and IOS XE Software SNMP Software Denial of Service Vulnerabilities&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;CVE-2025-20172 Cisco IOS and IOS XE (7.7 high), and IOS XR (4.3 medium) Software SNMP Denial of Service Vulnerabilities&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-42tgsdMG&amp;#34&#34;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-42tgsdMG&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities&amp;lt;/a&amp;gt; CVE-2025-20204 and CVE-2025-20205 (4.8 medium)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF&amp;#34&#34;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Cisco Identity Services Engine Insecure Java Deserialization and Authorization Bypass Vulnerabilities&amp;lt;/a&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;CVE-2025-20124 (&amp;lt;strong&amp;gt;9.9 critical&amp;lt;/strong&amp;gt;) Cisco ISE Insecure Java Deserialization Vulnerability&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;CVE-2025-20125 (&amp;lt;strong&amp;gt;9.1 critical&amp;lt;/strong&amp;gt;) Cisco ISE Authorization Bypass Vulnerability&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-xss-uexUZrEW&amp;#34&#34;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-xss-uexUZrEW&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Cisco Expressway Series Cross-Site Scripting Vulnerability&amp;lt;/a&amp;gt; CVE-2025-20179 (6.1 medium)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-xss-WCk2WcuG&amp;#34&#34;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-xss-WCk2WcuG&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Cisco Secure Email and Web Manager and Secure Email Gateway Cross-Site Scripting Vulnerability&amp;lt;/a&amp;gt; CVE-2025-20180 (4.8 medium)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-snmp-inf-FqPvL8sX&amp;#34&#34;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-snmp-inf-FqPvL8sX&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance SNMP Polling Information Disclosure Vulnerability&amp;lt;/a&amp;gt; CVE-2025-20207 (4.3 medium)&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;&amp;#34;The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.&amp;#34;&lt;br/&gt;&lt;br/&gt;#cisco #vulnerability #cve #infosec #cybersecurity
    </content>
    <updated>2025-02-05T16:37:04Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf64gcmpt37nv8cxka66vcsee7e7rjz0l3tl6lsv835z7qmxv55yczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsywqmxzr</id>
    
      <title type="html">**Veeam**: [CVE-2025-23114](https://www.veeam.com/kb4712 ) ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf64gcmpt37nv8cxka66vcsee7e7rjz0l3tl6lsv835z7qmxv55yczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsywqmxzr" />
    <content type="html">
      **Veeam**: [CVE-2025-23114](&lt;a href=&#34;https://www.veeam.com/kb4712&#34;&gt;https://www.veeam.com/kb4712&lt;/a&gt; )&lt;br/&gt;CVE-2025-23114 (9.0 critical) A vulnerability within the Veeam Updater component that allows an attacker to utilize a Man-in-the-Middle attack to execute arbitrary code on the affected appliance server with root-level permissions. This CVE impacts multiple versions of Veeam Backup. No mention of exploitation. h/t: &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1s6eewzr2zvz3ppsa6k8j2hadamsug7q4rp068wmz3grtf440xxkqr8n008&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;cR0w :cascadia: :gayint: 🏴‍☠️&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1s6e…n008&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;&lt;br/&gt;&lt;br/&gt;#veeam #cve #CVE_2025_23114 #infosec #vulnerability #cybersecurity
    </content>
    <updated>2025-02-05T14:06:19Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsru55rr4d904swgdzqv4veehdp3ng937cgsj6wuqvk5tza2gc39hqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy0pdyu0</id>
    
      <title type="html">Unofficial #PatchTuesday continues with **Google Chrome**: ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsru55rr4d904swgdzqv4veehdp3ng937cgsj6wuqvk5tza2gc39hqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy0pdyu0" />
    <content type="html">
      Unofficial #PatchTuesday continues with **Google Chrome**: [Stable Channel Update for Desktop](&lt;a href=&#34;https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop.html&#34;&gt;https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop.html&lt;/a&gt; )&lt;br/&gt;Chrome 133.0.6943.53 (Linux) and 133.0.6943.53/54( Windows, Mac) includes 12 security fixes, 3 are externally reported:&amp;lt;li&amp;gt;CVE-2025-0444 (high) Use after free in Skia&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;CVE-2025-0445 (high) Use after free in V8&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;CVE-2025-0451 (medium) Inappropriate implementation in Extensions API&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;No mention of [exploitation](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;#google #chrome #vulnerability #cve #infosec #cybersecurity
    </content>
    <updated>2025-02-04T19:05:24Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvkee2m37mwnge7fdpte0jesy5pt5js63h7wau2xge8n4plr7ususzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsys5ltm3</id>
    
      <title type="html">In relation to parent toots above, see related press release from ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvkee2m37mwnge7fdpte0jesy5pt5js63h7wau2xge8n4plr7ususzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsys5ltm3" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsd98fxh6srj95rhjs9le03kr56tlg3acnwksqqzp89nd2pm0atljs32ht30&#39;&gt;nevent1q…ht30&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;In relation to parent toots above, see related press release from **CISA**: [CISA Partners with ASD’s ACSC, CCCS, NCSC-UK, and Other International and US Organizations to Release Guidance on Edge Devices](&lt;a href=&#34;https://www.cisa.gov/news-events/alerts/2025/02/04/cisa-partners-asds-acsc-cccs-ncsc-uk-and-other-international-and-us-organizations-release-guidance&#34;&gt;https://www.cisa.gov/news-events/alerts/2025/02/04/cisa-partners-asds-acsc-cccs-ncsc-uk-and-other-international-and-us-organizations-release-guidance&lt;/a&gt; )&lt;br/&gt;&lt;br/&gt;&amp;gt; Foreign adversaries routinely exploit software vulnerabilities in network edge devices to infiltrate critical infrastructure networks and systems. The damage can be expensive, time-consuming, and reputationally catastrophic for public and private sector organizations. These guidance documents detail various considerations and strategies for a more secure and resilient network both before and after a compromise.&lt;br/&gt;&lt;br/&gt;#infosec #cybersecurity #networksecurity #securitybestpractice #securebydesign
    </content>
    <updated>2025-02-04T17:16:25Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd98fxh6srj95rhjs9le03kr56tlg3acnwksqqzp89nd2pm0atljszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsydcrp5d</id>
    
      <title type="html">See related press release **NCSC-UK**: [Cyber agencies unveil new ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd98fxh6srj95rhjs9le03kr56tlg3acnwksqqzp89nd2pm0atljszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsydcrp5d" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsqjlhf4sdfpr337sa9xnjfyg3v8cm6zthzsl0x2ncsv7h4v3xf85cu96kcr&#39;&gt;nevent1q…6kcr&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;See related press release **NCSC-UK**: [Cyber agencies unveil new guidelines to secure edge devices from increasing threat](&lt;a href=&#34;https://www.ncsc.gov.uk/news/cyber-agencies-unveil-new-guidelines-to-secure-edge-devices-from-increasing-threat&#34;&gt;https://www.ncsc.gov.uk/news/cyber-agencies-unveil-new-guidelines-to-secure-edge-devices-from-increasing-threat&lt;/a&gt; )&lt;br/&gt;The new guidelines encourage device manufacturers to include and enable standard logging and forensic features that are robust and secure by default, so that network defenders can more easily detect malicious activity and investigate following an intrusion.&lt;br/&gt;&lt;br/&gt;#infosec #cybersecurity #networksecurity #securitybestpractice #securebydesign
    </content>
    <updated>2025-02-04T16:51:31Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqjlhf4sdfpr337sa9xnjfyg3v8cm6zthzsl0x2ncsv7h4v3xf85czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyxx5k5j</id>
    
      <title type="html">**FBI**: [Guidance on digital forensics and protective monitoring ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqjlhf4sdfpr337sa9xnjfyg3v8cm6zthzsl0x2ncsv7h4v3xf85czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyxx5k5j" />
    <content type="html">
      **FBI**: [Guidance on digital forensics and protective monitoring specifications for producers of network devices and appliances](&lt;a href=&#34;https://www.ic3.gov/CSA/2025/250204.pdf&#34;&gt;https://www.ic3.gov/CSA/2025/250204.pdf&lt;/a&gt; ) (PDF)&lt;br/&gt;This guidance outlines expectations for the minimum requirement for forensic visibility, to help network defenders secure organizational networks both before and after a compromise. Network defenders are encouraged to consider these features when selecting new physical and virtual network devices.&lt;br/&gt;&lt;br/&gt;#infosec #cybersecurity #networksecurity #securitybestpractice
    </content>
    <updated>2025-02-04T16:50:05Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspk0w4vcaps0kvlk5648cchtaazfw9p7pj2mh54uhjxt6gmxyl85gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsys2nlx5</id>
    
      <title type="html">**NETGEAR** did this earlier than #PatchTuesday on 01 February ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspk0w4vcaps0kvlk5648cchtaazfw9p7pj2mh54uhjxt6gmxyl85gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsys2nlx5" />
    <content type="html">
      **NETGEAR** did this earlier than #PatchTuesday on 01 February 2025 but here you go:&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://kb.netgear.com/000066558/Security-Advisory-for-Unauthenticated-RCE-on-Some-WiFi-Routers-PSV-2023-0039&amp;#34&#34;&gt;https://kb.netgear.com/000066558/Security-Advisory-for-Unauthenticated-RCE-on-Some-WiFi-Routers-PSV-2023-0039&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Security Advisory for Unauthenticated RCE on Some WiFi Routers, PSV-2023-0039&amp;lt;/a&amp;gt;An unassigned (no CVE) unauthenticated remote code execution vulnerability (CVSSv3.0: 9.8 critical) has been patched in NETGEAR XR1000, XR1000v2, and XR500 WiFi routers.&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://kb.netgear.com/000066557/Security-Advisory-for-Authentication-Bypass-on-Some-Wireless-Access-Points-PSV-2021-0117&amp;#34&#34;&gt;https://kb.netgear.com/000066557/Security-Advisory-for-Authentication-Bypass-on-Some-Wireless-Access-Points-PSV-2021-0117&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Security Advisory for Authentication Bypass on Some Wireless Access Points, PSV-2021-0117&amp;lt;/a&amp;gt;An unassigned (no CVE) authentication bypass security vulnerability (9.6 critical) was patched on NETGEAR WAX206, WAX220 and WAX214c2 wireless access points.&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;#netgear #vulnerability #infosec #cybersecurity
    </content>
    <updated>2025-02-04T16:41:33Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsr27ggm5y7svppmmcgj009pgf4f79wnwkeuxyurle0ez6yvz8269szyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy5alak9</id>
    
      <title type="html">**Claroty**: [Do the CONTEC CMS8000 Patient Monitors Contain a ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsr27ggm5y7svppmmcgj009pgf4f79wnwkeuxyurle0ez6yvz8269szyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy5alak9" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqszv5zarns73et48xkq86wgeqkcclgzdh25meyasjs6zh38eywwt7c0eqxjt&#39;&gt;nevent1q…qxjt&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;**Claroty**: [Do the CONTEC CMS8000 Patient Monitors Contain a Chinese Backdoor? The Reality is More Complicated...](&lt;a href=&#34;https://claroty.com/team82/research/are-contec-cms8000-patient-monitors-infected-with-a-chinese-backdoor-the-reality-is-more-complicated&#34;&gt;https://claroty.com/team82/research/are-contec-cms8000-patient-monitors-infected-with-a-chinese-backdoor-the-reality-is-more-complicated&lt;/a&gt; )&lt;br/&gt;There was increased interest in healthcare industry&amp;#39;s patient monitors after CISA warned on 31 January 2025 that [Contec CMS8000 Contains a Backdoor](&lt;a href=&#34;https://www.cisa.gov/resources-tools/resources/contec-cms8000-contains-backdoor&#34;&gt;https://www.cisa.gov/resources-tools/resources/contec-cms8000-contains-backdoor&lt;/a&gt; ). Claroty&amp;#39;s Team82 actually previously investigated the firmware and reached the conclusion that it is most likely not a hidden backdoor, but instead an insecure/vulnerable design that introduces great risk to the patient monitor users and hospital networks. Their conclusion is mainly based on the fact that the vendor—and resellers who re-label and sell the monitor—list the IP address in their manuals and instruct users to configure the Central Management System (CMS) with this IP address within their internal networks. h/t: &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1u4tr26gtl0pr9d8u6w0cj49czmesrmy46hgz3q4rejyzu3sr0v0qw894re&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Jonathan Reiter (张飞)&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1u4t…94re&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;; cc: &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub12xhpqz0ygq7cy87pcyhpf06tgr0yf37uv9mcnzzqeg00n70tca5q0vzxeq&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Will Dormann&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub12xh…zxeq&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;br/&gt;&lt;br/&gt;Note: there&amp;#39;s associated vulnerabilities: &amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2025-0626&amp;#34&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2025-0626&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-0626&amp;lt;/a&amp;gt; (CVSSv4: 7.7/v3.1: 7.5 high) Hidden Functionality vulnerability in Contec Health CMS8000 Patient Monitor&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2025-0683&amp;#34&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2025-0683&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-0683&amp;lt;/a&amp;gt; (CVSSv4: 8.2 high/v3.1: 5.9 medium) Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Contec Health CMS8000 Patient Monitor&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;#contec #backdoor #hph #hhs #vulnerability #cve #china #cisa #infosec #cybersecurity
    </content>
    <updated>2025-02-04T16:37:05Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs885lm7xzrvv2ax84ujh5c0zdk74jar8mekc37cm0lfg5cr58zmkqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyf8ap5u</id>
    
      <title type="html">#PatchTuesday continues with **Zyxel**: [Zyxel security advisory ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs885lm7xzrvv2ax84ujh5c0zdk74jar8mekc37cm0lfg5cr58zmkqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyf8ap5u" />
    <content type="html">
      #PatchTuesday continues with **Zyxel**: [Zyxel security advisory for command injection and insecure default credentials vulnerabilities in certain legacy DSL CPE](&lt;a href=&#34;https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025&#34;&gt;https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025&lt;/a&gt; )&lt;br/&gt;Zyxel&amp;#39;s security advisory confirms the existence of [CVE-2024-40890](&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2024-40890&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2024-40890&lt;/a&gt; ), [CVE-2024-40891](&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2024-40891&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2024-40891&lt;/a&gt; ), and [CVE-2025-0890](&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2025-0890&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2025-0890&lt;/a&gt; ) affecting end-of-life DSL CPE products. While they link  to GreyNoise&amp;#39;s [blog post](&lt;a href=&#34;https://www.greynoise.io/blog/active-exploitation-of-zero-day-zyxel-cpe-vulnerability-cve-2024-40891&#34;&gt;https://www.greynoise.io/blog/active-exploitation-of-zero-day-zyxel-cpe-vulnerability-cve-2024-40891&lt;/a&gt; ), Zyxel does not acknowledge the fact that CVE-2024-40891 (8.8 high) post-auth command injection is a **zero-day being exploited in the wild** by a Mirai botnet variant. They reiterate that EoL products don’t receive further support and: &lt;br/&gt;&lt;br/&gt;&amp;gt; &amp;#34;we strongly recommend that users replace them with newer-generation products for optimal protection.&amp;#34;&lt;br/&gt;&lt;br/&gt;Note: DSL CPE likely stands for Digital Subscriber Line Customer-Premises Equipment cc: &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1x6rdj7gu3magc9j29a042njygsjx9hg3husmk45sjf9n7rhx85fqs0qtcd&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Fellows&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1x6r…qtcd&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; for more Patch Tuesday Madness.&lt;br/&gt;&lt;br/&gt;#zyxel #vulnerability #cve #CVE_2024_40891 #zeroday #eitw #activeexploitation #mirai #botnet #infosec #cybersecurity
    </content>
    <updated>2025-02-04T16:20:24Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyzuaffwzjwqm25g3j5x6pjrftv0h0awrw2mgzwn6yly69e095d9szyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy3zhfyw</id>
    
      <title type="html">**CISA**: [CISA Adds Four Known Exploited Vulnerabilities to ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyzuaffwzjwqm25g3j5x6pjrftv0h0awrw2mgzwn6yly69e095d9szyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy3zhfyw" />
    <content type="html">
      **CISA**: [CISA Adds Four Known Exploited Vulnerabilities to Catalog](&lt;a href=&#34;https://www.cisa.gov/news-events/alerts/2025/02/04/cisa-adds-four-known-exploited-vulnerabilities-catalog&#34;&gt;https://www.cisa.gov/news-events/alerts/2025/02/04/cisa-adds-four-known-exploited-vulnerabilities-catalog&lt;/a&gt; )&lt;br/&gt;Hot off the press!:&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2018-19410&amp;#34&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2018-19410&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2018-19410&amp;lt;/a&amp;gt; (&amp;lt;strong&amp;gt;9.8 critical&amp;lt;/strong&amp;gt;) Paessler PRTG Network Monitor Local File Inclusion Vulnerability&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2018-9276&amp;#34&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2018-9276&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2018-9276&amp;lt;/a&amp;gt; (7.2 high) Paessler PRTG Network Monitor OS Command Injection Vulnerability&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2024-29059&amp;#34&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2024-29059&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2024-29059&amp;lt;/a&amp;gt; (7.5 high) Microsoft .NET Framework Information Disclosure Vulnerability&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2024-45195&amp;#34&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2024-45195&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2024-45195&amp;lt;/a&amp;gt; (&amp;lt;strong&amp;gt;9.8 critical&amp;lt;/strong&amp;gt;) Apache OFBiz Forced Browsing Vulnerability&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;#cisa #cisakev #kev #vulnerability #eitw #activeexploitation #infosec #cybersecurity #knownexploitedvulnerabilitiescatalog
    </content>
    <updated>2025-02-04T15:42:18Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsq74ap0h98ea6lyj3jkt286hrdcleawasmlu6ev6l2nkensz9pnmgzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsytpjnvr</id>
    
      <title type="html">**Google Android zero-day**: [Android Security Bulletin February ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsq74ap0h98ea6lyj3jkt286hrdcleawasmlu6ev6l2nkensz9pnmgzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsytpjnvr" />
    <content type="html">
      **Google Android zero-day**: [Android Security Bulletin February 2025](&lt;a href=&#34;https://source.android.com/docs/security/bulletin/2025-02-01&#34;&gt;https://source.android.com/docs/security/bulletin/2025-02-01&lt;/a&gt; )&lt;br/&gt;46 CVEs (1 critical, 45 high severity) &lt;br/&gt;[CVE-2024-53104](&lt;a href=&#34;https://cve.org/CVERecord?id=CVE-2024-53104&#34;&gt;https://cve.org/CVERecord?id=CVE-2024-53104&lt;/a&gt; ) (7.8 high) media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (EoP in Kernel) cc: &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub17wvr8uywpuzew2lqvprnt4g7cuq0kyvdf8gz57dlv3rsjvfcer3qqgnag2&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;buherator&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub17wv…nag2&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;br/&gt;&lt;br/&gt;&amp;gt; Note: There are indications that CVE-2024-53104 may be under limited, targeted exploitation.&lt;br/&gt;&lt;br/&gt;#CVE_2024_53104 #android #google #vulnerability #zeroday #eitw #activeexploitation #infosec #cybersecurity
    </content>
    <updated>2025-02-03T19:14:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2zs8gue9wt9ktzqzzjty6amlz3mgs4z2n04cwmyr8cu7x8m8h53qzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsydku547</id>
    
      <title type="html">**Qualcomm**: [February 2025 Security ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2zs8gue9wt9ktzqzzjty6amlz3mgs4z2n04cwmyr8cu7x8m8h53qzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsydku547" />
    <content type="html">
      **Qualcomm**: [February 2025 Security Bulletin](&lt;a href=&#34;https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html&#34;&gt;https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html&lt;/a&gt; )&lt;br/&gt;Qualcomm has 7 propriety vulnerabilities (1 critical, 5 high, 1 medium severity) and 17 open source vulnerabilities (1 critical, 9 high, 7 medium). That critical vulnerability CVE-2024-49837 (7.8 high) is Improper Validation of Array Index in Automotive OS Platform QNX. No mention of [exploitation](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; ). h/t &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1s6eewzr2zvz3ppsa6k8j2hadamsug7q4rp068wmz3grtf440xxkqr8n008&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;cR0w :cascadia: :gayint: 🏴‍☠️&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1s6e…n008&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;&lt;br/&gt;&lt;br/&gt;#qualcomm #patchtuesday #vulnerability #infosec #cybersecurity
    </content>
    <updated>2025-02-03T18:12:14Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszacxx2fs6yyf7ftulmzqr649ksuewja0grxkddntd4nls3vwfmaczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyazj4pq</id>
    
      <title type="html">Forget Punxsutawney Phil, my scrambled eggs had a foreboding omen ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszacxx2fs6yyf7ftulmzqr649ksuewja0grxkddntd4nls3vwfmaczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyazj4pq" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspfd77ez45muqmhhnwz9t9udtd4cxg933t7wewa507eh7k8ya5atqrezv4a&#39;&gt;nevent1q…zv4a&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Forget Punxsutawney Phil, my scrambled eggs had a foreboding omen this morning.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/934/836/985/320/541/original/67852934c25325e4.jpg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-02-02T14:48:41Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszv5zarns73et48xkq86wgeqkcclgzdh25meyasjs6zh38eywwt7czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyeu9xxq</id>
    
      <title type="html">**CISA**: [Contec CMS8000 Contains a ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszv5zarns73et48xkq86wgeqkcclgzdh25meyasjs6zh38eywwt7czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyeu9xxq" />
    <content type="html">
      **CISA**: [Contec CMS8000 Contains a Backdoor](&lt;a href=&#34;https://www.cisa.gov/resources-tools/resources/contec-cms8000-contains-backdoor&#34;&gt;https://www.cisa.gov/resources-tools/resources/contec-cms8000-contains-backdoor&lt;/a&gt; )&lt;br/&gt;CISA has an 11 page [PDF advisory](&lt;a href=&#34;https://www.cisa.gov/sites/default/files/2025-01/fact-sheet-contec-cms8000-contains-a-backdoor-508c.pdf&#34;&gt;https://www.cisa.gov/sites/default/files/2025-01/fact-sheet-contec-cms8000-contains-a-backdoor-508c.pdf&lt;/a&gt; ) warning that a patient monitor known as Contec CMS8000 has an embedded backdoor with a hardcoded IP address which enables patient data spillage, or remote code execution (CISA puts forth a scenario where the device is altered to display inaccurate patient vital signs, which poses a serious risk to patient&amp;#39;s safety). The Contec CMS8000 (made by Contec Medical Systems in China) is used by the U.S. Healthcare and Public Health (HPH) sector, and in the European Union to provide continuous monitoring of a patient&amp;#39;s vital signs. See related Food and Drug Administration advisory [Cybersecurity Vulnerabilities with Certain Patient Monitors from Contec and Epsimed: FDA Safety Communication](&lt;a href=&#34;https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication&#34;&gt;https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;#cisa #content #health #infosec #cybersecurity #hph #china
    </content>
    <updated>2025-01-30T19:36:26Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstwyuew9hs6lgntvcws6auyl6tk85rjrhxksxzzaq83dal7z68ddgzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyutlev3</id>
    
      <title type="html">we should ask for the expert opinion of pilot @npub1lcc…lcye ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstwyuew9hs6lgntvcws6auyl6tk85rjrhxksxzzaq83dal7z68ddgzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyutlev3" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsxn0l36fcs24p839t0tl8xu2uuk0arcmj0wkte7ktd0ua4077yt8gjn37gg&#39;&gt;nevent1q…37gg&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;we should ask for the expert opinion of pilot &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1lcc6wn885u6k395x5j5tmdm94r6dh9zajxm8gyk82pv2s2j3el7sc6lcye&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Kevin Beaumont&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1lcc…lcye&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; who has flown thousands of hours of various Microsoft Flight Simulators. &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub12aszc2xqlhhlug489ldgzdgd3cap6ndjf2y43lw2dmm5qc7szveq3xyvvc&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Viss&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub12as…yvvc&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1s6eewzr2zvz3ppsa6k8j2hadamsug7q4rp068wmz3grtf440xxkqr8n008&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;cR0w :cascadia: :gayint: 🏴‍☠️&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1s6e…n008&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub17cvzvmxvn6exfnjrff7r0656nj2dys6qndtx4qtfhgl0m73a5vcsk39jd4&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Chilly :donor: 🛡️ :gayint: :ifin:&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub17cv…9jd4&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1vtxnjefp3k907zuva2uncpntqks8amlz2pwxlppx5tnfwvvymxzsj2e7wk&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Jerry 🦙💝🦙&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1vtx…e7wk&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1pzm45nps48hyc8z5z478qrteppmxkkkc0uxxryuurw99qdxj6dcqsm2a9l&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Andrew Kalat&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1pzm…2a9l&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;
    </content>
    <updated>2025-01-30T16:55:39Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswu4j8v7ux58mfl82fx80am9xxz3tm8efxjj8lwsz0n09lgxussfczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyuyymev</id>
    
      <title type="html">**Palo Alto Networks** [PAN-SA-2025-0003 Informational: PAN-OS ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswu4j8v7ux58mfl82fx80am9xxz3tm8efxjj8lwsz0n09lgxussfczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyuyymev" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2y0h6u5ust93wyd5e7qd0etflv7age4y85j2me86d4vf4wrnenncs2vj09&#39;&gt;nevent1q…vj09&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;**Palo Alto Networks** [PAN-SA-2025-0003 Informational: PAN-OS BIOS and Bootloader Security Bulletin](&lt;a href=&#34;https://security.paloaltonetworks.com/PAN-SA-2025-0003&#34;&gt;https://security.paloaltonetworks.com/PAN-SA-2025-0003&lt;/a&gt; )&lt;br/&gt;See parent toot above. Palo Alto Networks is in damage control mode, after Eclypsium reported that their Next Generation Firewall (NGFW) products were still impacted by multiple known vulnerabilities.&lt;br/&gt;&lt;br/&gt;&amp;gt; Palo Alto Networks is aware of claims of multiple vulnerabilities in hardware device firmware and bootloaders included in our PA-Series (hardware) firewalls.&lt;br/&gt;&amp;gt; Palo Alto Networks is not aware of any malicious exploitation of these issues in our products. We are aware of a blog post discussing these issues.&lt;br/&gt;&lt;br/&gt;#paloaltonetworks #panw #vulnerability #cve #infosec #cybersecurity #eclypsium
    </content>
    <updated>2025-01-24T00:43:29Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvpg653ztajk5vafew3pq35q9wlyvfzvyukgxnhwnlg8x3vrnl4uczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy33jdzg</id>
    
      <title type="html">**FBI**: [North Korean IT Workers Conducting Data ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvpg653ztajk5vafew3pq35q9wlyvfzvyukgxnhwnlg8x3vrnl4uczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy33jdzg" />
    <content type="html">
      **FBI**: [North Korean IT Workers Conducting Data Extortion](&lt;a href=&#34;https://www.ic3.gov/PSA/2025/PSA250123&#34;&gt;https://www.ic3.gov/PSA/2025/PSA250123&lt;/a&gt; )&lt;br/&gt;The Federal Bureau of Investigation (FBI) is providing an update to previously shared guidance regarding Democratic People&amp;#39;s Republic of Korea (North Korea) Information Technology (IT) workers to raise public awareness of their increasingly malicious activity, which has recently included data extortion. FBI is warning the public, private sector, and international community about North Korean IT workers&amp;#39; continued victimization of US-based businesses. In recent months, in addition to data extortion, FBI has observed North Korean IT workers leveraging unlawful access to company networks to exfiltrate proprietary and sensitive data, facilitate cyber-criminal activities, and conduct revenue-generating activity on behalf of the regime.&lt;br/&gt;&lt;br/&gt;#northkoreanitworkers #northkorea #cybercrime #infosec #cybersecurity #cyberthreatintelligence #cti
    </content>
    <updated>2025-01-23T19:13:58Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2y0h6u5ust93wyd5e7qd0etflv7age4y85j2me86d4vf4wrnennczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsylmql94</id>
    
      <title type="html">**Eclysium**: [PANdora&amp;#39;s Box: Vulnerabilities Found in ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2y0h6u5ust93wyd5e7qd0etflv7age4y85j2me86d4vf4wrnennczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsylmql94" />
    <content type="html">
      **Eclysium**: [PANdora&amp;#39;s Box: Vulnerabilities Found in NGFW](&lt;a href=&#34;https://eclypsium.com/research/pandoras-box-vulns-in-security-appliances/&#34;&gt;https://eclypsium.com/research/pandoras-box-vulns-in-security-appliances/&lt;/a&gt; )&lt;br/&gt;Eclysium evaluated three Palo Alto Networks appliances, finding known vulnerabilities ranging from &amp;#34;Boothole&amp;#34; (buffer overflow to RCE) and secure boot bypass to LogoFail, PixieFail, leaked keys bypass, etc. Elypsium provides a timeline with the most recent update requesting that they wait for a patch before going public with the details, but no estimated time of patch release. &lt;br/&gt;&lt;br/&gt;#paloaltonetworks #panos #pixiefail #logofail #boothole #secureboot #panw #infosec #vulnerability #cve #cybersecurity
    </content>
    <updated>2025-01-23T16:24:39Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0yufarq22pzmurcmahmhye00aczqzldc59k5d67f20c0u8jkpucszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyfupatl</id>
    
      <title type="html">**SonicWall exploited zero-day**: [SMA1000 Pre-Authentication ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0yufarq22pzmurcmahmhye00aczqzldc59k5d67f20c0u8jkpucszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyfupatl" />
    <content type="html">
      **SonicWall exploited zero-day**: [SMA1000 Pre-Authentication Remote Command Execution Vulnerability](&lt;a href=&#34;https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002&#34;&gt;https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002&lt;/a&gt; )&lt;br/&gt;CVE-2025-23006 (**9.8 critical**) Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands.&lt;br/&gt;&lt;br/&gt;&amp;gt; IMPORTANT: SonicWall PSIRT has been notified of possible active exploitation of the referenced vulnerability by threat actors&lt;br/&gt;&lt;br/&gt;cc: &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub17ladwxy5u4yzn9nspegp8u9xjzh35529wc2zgrfpnft3ax0wv8uskq5j4p&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;GoatYell group&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub17la…5j4p&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1s6eewzr2zvz3ppsa6k8j2hadamsug7q4rp068wmz3grtf440xxkqr8n008&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;cR0w :cascadia: :gayint: 🏴‍☠️&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1s6e…n008&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1lcc6wn885u6k395x5j5tmdm94r6dh9zajxm8gyk82pv2s2j3el7sc6lcye&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Kevin Beaumont&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1lcc…lcye&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1vc39pnjdqd77zzdxff4qyv8h3x0ey2mkx33c3vl8egr0a9ysxkxsk0axsh&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;BrianKrebs&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1vc3…axsh&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;br/&gt;&lt;br/&gt;#zeroday #CVE_2025_23006 #sonicwall #vulnerability #CVE #infosec #cybersecurity #eitw #activeexploitation
    </content>
    <updated>2025-01-23T12:16:30Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxfn94s6d2w8wwdeajpadqr2a25efq5x4tc7xmlu4kzc6884tye4czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy682peu</id>
    
      <title type="html">**Google** Chrome security advisory: [Stable Channel Update for ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxfn94s6d2w8wwdeajpadqr2a25efq5x4tc7xmlu4kzc6884tye4czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy682peu" />
    <content type="html">
      **Google** Chrome security advisory: [Stable Channel Update for Desktop](&lt;a href=&#34;https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_22.html&#34;&gt;https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_22.html&lt;/a&gt; )&lt;br/&gt;New version 132.0.6834.110/111 for Windows, Mac and 132.0.6834.110 for Linux includes 3 security fixes, 2 were externally reported. CVE-2025-0611 (high severity) Object corruption in V8 and CVE-2025-0612 (high) Out of bounds memory access in V8. No mention of [exploitation](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;#google #chrome #chromium #vulnerability #cve #infosec #cybersecurity
    </content>
    <updated>2025-01-22T19:03:31Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8lh4y5539lee0crlukgfvsekvrfwhkqfpexj4sfxtsyqrrqd8f4gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy3j9p3r</id>
    
      <title type="html">**Cisco Zero-Day**: [ClamAV OLE2 File Format Decryption Denial of ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8lh4y5539lee0crlukgfvsekvrfwhkqfpexj4sfxtsyqrrqd8f4gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy3j9p3r" />
    <content type="html">
      **Cisco Zero-Day**: [ClamAV OLE2 File Format Decryption Denial of Service Vulnerability](&lt;a href=&#34;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA&#34;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA&lt;/a&gt; )&lt;br/&gt;CVE-2025-20128 (5.3 medium) A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read.&lt;br/&gt;&lt;br/&gt;&amp;gt; The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.&lt;br/&gt;&amp;gt; The Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory.&lt;br/&gt;&lt;br/&gt;Two more Cisco security advisories:&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-privesc-uy2Vf8pc&amp;#34&#34;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-privesc-uy2Vf8pc&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Cisco Meeting Management REST API Privilege Escalation Vulnerability&amp;lt;/a&amp;gt; CVE-2025-20156 (&amp;lt;strong&amp;gt;9.9 critical&amp;lt;/strong&amp;gt;) &amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-sip-dos-mSySbrmt&amp;#34&#34;&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-sip-dos-mSySbrmt&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Cisco BroadWorks SIP Denial of Service Vulnerability&amp;lt;/a&amp;gt; CVE-2025-20165 (7.5 high)&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;These two do not mention proof of concept or [exploitation](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;#cisco #vulnerability #cve #infosec #cybersecurity
    </content>
    <updated>2025-01-22T16:15:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszux8jeh8fz02yq9ltkv24c44lqynsh6aqpngkc0uy3ekesqtqkegzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyqfdhlv</id>
    
      <title type="html">You&amp;#39;ve heard of #PatchTuesday, now get ready for ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszux8jeh8fz02yq9ltkv24c44lqynsh6aqpngkc0uy3ekesqtqkegzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyqfdhlv" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswr5p9dpkgwcgvtnrd65ssygzsmq5nkx29zjqvzsajm2gkjw5uejqfexjpl&#39;&gt;nevent1q…xjpl&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;You&amp;#39;ve heard of #PatchTuesday, now get ready for PatchEveryday: **Elastic** security advisories 22 January 2025:&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://discuss.elastic.co/t/fleet-server-8-15-0-security-update-esa-2024-31/373522&amp;#34&#34;&gt;https://discuss.elastic.co/t/fleet-server-8-15-0-security-update-esa-2024-31/373522&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Fleet Server 8.15.0 Security Update (ESA-2024-31)&amp;lt;/a&amp;gt; CVE-2024-52975 (8.0 high) Fleet Server sensitive information exposure via logs&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://discuss.elastic.co/t/kibana-8-15-0-security-update-esa-2024-29-esa-2024-30/373521&amp;#34&#34;&gt;https://discuss.elastic.co/t/kibana-8-15-0-security-update-esa-2024-29-esa-2024-30/373521&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Kibana 8.15.0 Security Update (ESA-2024-29, ESA-2024-30)&amp;lt;/a&amp;gt; CVE-2024-43710 (4.3 medium) Kibana server-side request forgery&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;No mention of [exploitation](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;#elastic #kibana #vulnerability #CVE #infosec #cybersecurity
    </content>
    <updated>2025-01-22T16:02:58Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqv2enh97x4vppah3d40symx74qz6fk0430p4velfvvh3m4pjcwqqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyr2zcz5</id>
    
      <title type="html">**Oracle**: [Oracle Critical Patch Update Advisory - January ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqv2enh97x4vppah3d40symx74qz6fk0430p4velfvvh3m4pjcwqqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyr2zcz5" />
    <content type="html">
      **Oracle**: [Oracle Critical Patch Update Advisory - January 2025](&lt;a href=&#34;https://www.oracle.com/security-alerts/cpujan2025.html&#34;&gt;https://www.oracle.com/security-alerts/cpujan2025.html&lt;/a&gt; )&lt;br/&gt;It&amp;#39;s a pain in the butt to read, but there&amp;#39;s 300&#43; vulnerabilities and coupled with the Oracle VP of Security Assurance&amp;#39;s blog post [January 2025 Critical Patch Update Released](&lt;a href=&#34;https://blogs.oracle.com/security/post/january-2025-cpu-released&#34;&gt;https://blogs.oracle.com/security/post/january-2025-cpu-released&lt;/a&gt; ), there&amp;#39;s likely no mention of [exploitation](&lt;a href=&#34;https://www.oracle.com/security-alerts/cpujan2025.html&#34;&gt;https://www.oracle.com/security-alerts/cpujan2025.html&lt;/a&gt; ). &lt;br/&gt;&lt;br/&gt;See related The Hacker News reporting: [Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products](&lt;a href=&#34;https://thehackernews.com/2025/01/oracle-releases-january-2025-patch-to.html&#34;&gt;https://thehackernews.com/2025/01/oracle-releases-january-2025-patch-to.html&lt;/a&gt; )&lt;br/&gt;&lt;br/&gt;#oracle #vulnerability #PatchTuesday #cve #infosec #cybersecurity
    </content>
    <updated>2025-01-22T12:35:53Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswr5p9dpkgwcgvtnrd65ssygzsmq5nkx29zjqvzsajm2gkjw5uejqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyxg5lr6</id>
    
      <title type="html">We&amp;#39;ve had one #PatchTuesday yes, but how about second Patch ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswr5p9dpkgwcgvtnrd65ssygzsmq5nkx29zjqvzsajm2gkjw5uejqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyxg5lr6" />
    <content type="html">
      We&amp;#39;ve had one #PatchTuesday yes, but how about second Patch Tuesday?&lt;br/&gt;**Elastic** security advisories:&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://discuss.elastic.co/t/kibana-7-17-23-and-8-14-2-security-update-esa-2024-26/373443&amp;#34&#34;&gt;https://discuss.elastic.co/t/kibana-7-17-23-and-8-14-2-security-update-esa-2024-26/373443&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Kibana 7.17.23 and 8.14.2 Security Update (ESA-2024-26)&amp;lt;/a&amp;gt; CVE-2024-52973 (6.5 medium) DoS&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://discuss.elastic.co/t/elasticsearch-7-17-21-and-8-13-3-security-update-esa-2024-25/373442&amp;#34&#34;&gt;https://discuss.elastic.co/t/elasticsearch-7-17-21-and-8-13-3-security-update-esa-2024-25/373442&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Elasticsearch 7.17.21 and 8.13.3 Security Update (ESA-2024-25)&amp;lt;/a&amp;gt; CVE-2024-43709 (6.5 medium) DoS&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://discuss.elastic.co/t/elastic-defend-8-13-3-security-update-esa-2024-24/373441&amp;#34&#34;&gt;https://discuss.elastic.co/t/elastic-defend-8-13-3-security-update-esa-2024-24/373441&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Elastic Defend 8.13.3 Security Update (ESA-2024-24)&amp;lt;/a&amp;gt; CVE-2024-37284 (5.5 medium) DoS&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;No mention of [exploitation](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;#elastic #kibana #infosec #vulnerability #cve #cybersecurity
    </content>
    <updated>2025-01-21T13:40:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdrffpgk7z6j6chpmhth0le783yfcdgr7t8flwp764y42c53xhw4gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy5qxq0l</id>
    
      <title type="html">**JetBrains** security advisory: [TeamCity 2024.12.1 Bug Fix Is ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdrffpgk7z6j6chpmhth0le783yfcdgr7t8flwp764y42c53xhw4gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy5qxq0l" />
    <content type="html">
      **JetBrains** security advisory: [TeamCity 2024.12.1 Bug Fix Is Now Available](&lt;a href=&#34;https://blog.jetbrains.com/teamcity/2025/01/teamcity-2024-12-1-bug-fix/&#34;&gt;https://blog.jetbrains.com/teamcity/2025/01/teamcity-2024-12-1-bug-fix/&lt;/a&gt; )&lt;br/&gt;It&amp;#39;s time for security theater as JetBrains announces a TeamCity update but refuses to tell us what vulnerabilities actually got fixed. 🤡 There are no release notes for 2024.12.1 at the time of this toot.&lt;br/&gt;There is no dropdown option for TeamCity 2024.12.1 in [Fixed security issues](&lt;a href=&#34;https://www.jetbrains.com/privacy-security/issues-fixed/?product=TeamCity&amp;amp;version=2024.12&#34;&gt;https://www.jetbrains.com/privacy-security/issues-fixed/?product=TeamCity&amp;amp;version=2024.12&lt;/a&gt; ) page. A CVE of &amp;#34;[TeamCity](&lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=teamcity&#34;&gt;https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=teamcity&lt;/a&gt; )&amp;#34; doesn&amp;#39;t show any new CVEs since December 2024. On average, they update their security bulletin with CVEs 4-30 days after announcing security updates.&lt;br/&gt;&lt;br/&gt;#jetbrains #teamcity #cve #vulnerability #infosec #cybersecurity
    </content>
    <updated>2025-01-21T13:25:33Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf937lx5w9dxkdcf8uux03eswtdlcts48rm8uzafwvs6pngzh72gszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsytyr7dv</id>
    
      <title type="html">#proton #andyyen ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf937lx5w9dxkdcf8uux03eswtdlcts48rm8uzafwvs6pngzh72gszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsytyr7dv" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqst9h6nhvhml98fcahxnhh8czgduugu748ttxdph3y8w7u0huvlnyqsrqf56&#39;&gt;nevent1q…qf56&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;#proton #andyyen&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/855/557/579/007/596/original/57037922b21a78b0.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-01-19T14:46:58Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrxft085960e7v6jfncmmg0azzwsjtvmms5gdqr5rm9sukvdv5fjqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyyz70vx</id>
    
      <title type="html">courtesy of @npub1jfd…v80a ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrxft085960e7v6jfncmmg0azzwsjtvmms5gdqr5rm9sukvdv5fjqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyyz70vx" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqszfg5m309hn48vuwdkfjkeghle2rdkrewsnu5gfpwj8ecmhz5e3tsxj364a&#39;&gt;nevent1q…364a&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;courtesy of &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1jfdlqt27qtu3k6vts08y3snrh0lhsw36s3xfswhzhr8gh6e2jcyssmv80a&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;K. Reid Wightman :verified: 🌻 :donor: :clippy:&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1jfd…v80a&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/851/538/602/185/789/original/b025790b4fa5026d.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-01-18T21:43:59Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd5ylaer5qp6tuupgu5kzc49ls0ffw0gzh4gh2dwm5esu3zeqpknszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyqam0a8</id>
    
      <title>Nostr event nevent1qqsd5ylaer5qp6tuupgu5kzc49ls0ffw0gzh4gh2dwm5esu3zeqpknszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyqam0a8</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd5ylaer5qp6tuupgu5kzc49ls0ffw0gzh4gh2dwm5esu3zeqpknszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyqam0a8" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs9qt00gwsg5gvy46f5vgawdqf3r5zt5yhy0qxuvge4djtquvhaz2glymhyt&#39;&gt;nevent1q…mhyt&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/845/007/451/668/799/original/ff3c57066925c0a2.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-01-17T18:03:01Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvt7k4g8kf9lqlnkjq984rj4gp453fcpeq52ppxenfcr53mtwde9qzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyqytgxk</id>
    
      <title type="html">Federal agencies and state governments legitimize Twitter by ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvt7k4g8kf9lqlnkjq984rj4gp453fcpeq52ppxenfcr53mtwde9qzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyqytgxk" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs0ufg92wutxmzj49ve03nwv87qq7k08s53jvvsuhtkswl47xnqqmqylwkq8&#39;&gt;nevent1q…wkq8&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Federal agencies and state governments legitimize Twitter by continuing to post important information to the platform. This includes cybersecurity companies like Microsoft Threat Intelligence who sometimes post exclusive CTI to their accounts. It&amp;#39;s shameful and is a step back for society.
    </content>
    <updated>2025-01-17T15:21:41Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyq33qytyhz0jga8f8944vk8wsvt290acrsche3d0yjwk5uspme5gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyhglus9</id>
    
      <title type="html">**CISA**: [Closing the Software Understanding ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyq33qytyhz0jga8f8944vk8wsvt290acrsche3d0yjwk5uspme5gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyhglus9" />
    <content type="html">
      **CISA**: [Closing the Software Understanding Gap](&lt;a href=&#34;https://www.cisa.gov/resources-tools/resources/closing-software-understanding-gap&#34;&gt;https://www.cisa.gov/resources-tools/resources/closing-software-understanding-gap&lt;/a&gt; )&lt;br/&gt;CISA, along with the Defense Advanced Research Projects Agency (DARPA), the Office of the Under Secretary of Defense for Research and Engineering (OUSD R&amp;amp;E), and the National Security Agency (NSA) published [Closing the Software Understanding Gap](&lt;a href=&#34;https://www.cisa.gov/sites/default/files/2025-01/joint-guidance-closing-the-software-understanding-gap-508c.pdf&#34;&gt;https://www.cisa.gov/sites/default/files/2025-01/joint-guidance-closing-the-software-understanding-gap-508c.pdf&lt;/a&gt; ) (PDF) which urges the U.S. government to take decisive and coordinated action to close the software understanding gap.  This gap arises from a disparity of technical investment where software production has outstripped investment in improving understanding for decades. By closing the software understanding gap, the United States will help mission owners and operators trust the system is functional, safe, and secure, and support confidence in national security and critical infrastructure systems.&lt;br/&gt;&lt;br/&gt;#securitybestpractice #cisa #securebydesign #infosec #cybersecurity
    </content>
    <updated>2025-01-16T19:49:15Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdn69xjrv7lxg2ppxa8ucqktsadpu52q66xnw6hv65upldvrl7huqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyu37hz0</id>
    
      <title type="html">&amp;gt; I add alt-text to images (mine and yours too)</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdn69xjrv7lxg2ppxa8ucqktsadpu52q66xnw6hv65upldvrl7huqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyu37hz0" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsgl5ecrxh6mh52mg9tp4nl6xcuj60a5s5g37ylvxpyf2g7n70wjvchsjja6&#39;&gt;nevent1q…jja6&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;&amp;gt; I add alt-text to images (mine and yours too)
    </content>
    <updated>2025-01-16T02:19:55Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswptfhvyc87ptd0zdkkc0clu4yuy2gr9r4vsrz576j4d237u4s6vqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy9lzmva</id>
    
      <title type="html">I think we should come up with a catchphrase that sticks: &amp;gt; ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswptfhvyc87ptd0zdkkc0clu4yuy2gr9r4vsrz576j4d237u4s6vqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy9lzmva" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsd4tv4jt5ryv8wy9rx97rx9w0umu3dk58ydjcvx3um0c6qhajuy7s042m9p&#39;&gt;nevent1q…2m9p&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I think we should come up with a catchphrase that sticks:&lt;br/&gt;&lt;br/&gt;&amp;gt; &amp;#34;I use Mastodon btw :)&amp;#34;
    </content>
    <updated>2025-01-16T02:16:02Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsppmsmp4xjg4stegallr8xkc7xgxlgykmlvay9t0rs664v3llfkhgzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyww4j85</id>
    
      <title type="html">someone like @npub1vtx…e7wk may have statistics on when ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsppmsmp4xjg4stegallr8xkc7xgxlgykmlvay9t0rs664v3llfkhgzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyww4j85" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsd734a2dt5uxkagmw9d232ez4upcwj0ar56ye95zxywvtt0p8y2zg63h6za&#39;&gt;nevent1q…h6za&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;someone like &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1vtxnjefp3k907zuva2uncpntqks8amlz2pwxlppx5tnfwvvymxzsj2e7wk&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Jerry 🦙💝🦙&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1vtx…e7wk&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; may have statistics on when registration spikes occur on specific days, which could be attributable to a popular entity promoting Mastodon or some billionaire embarrassing themselves and driving traffic off their platform.&lt;br/&gt;&lt;br/&gt;I recognize that there&amp;#39;s planned protests in the U.S. on Saturday, and probably protests on Monday, but it seemed odd that there&amp;#39;d be a surge of users this weekend or next week as if all of the other dumpster fires didn&amp;#39;t convince them.
    </content>
    <updated>2025-01-16T01:55:39Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs024hxg43uptgypuckn2kywkz4c6jwxzqa3uxz0llf8q4xjf25v7gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyhng29u</id>
    
      <title type="html">what makes this weekend special as opposed to any other day of ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs024hxg43uptgypuckn2kywkz4c6jwxzqa3uxz0llf8q4xjf25v7gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyhng29u" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2tjlqm628juyq4dkpnvqgce7d5dh72vn64uq9dl8skj3evjxm5ggkgzsj4&#39;&gt;nevent1q…zsj4&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;what makes this weekend special as opposed to any other day of the year though? I may be out of the loop.
    </content>
    <updated>2025-01-16T01:47:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstvmaw2xsamq7c5ttdy2733sa9w6l0ntlxlqqneg58a0z0xc7uawszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyxrs20n</id>
    
      <title type="html">**CISA**: [Microsoft Expanded Cloud Logs Implementation ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstvmaw2xsamq7c5ttdy2733sa9w6l0ntlxlqqneg58a0z0xc7uawszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyxrs20n" />
    <content type="html">
      **CISA**: [Microsoft Expanded Cloud Logs Implementation Playbook](&lt;a href=&#34;https://www.cisa.gov/resources-tools/resources/microsoft-expanded-cloud-logs-implementation-playbook&#34;&gt;https://www.cisa.gov/resources-tools/resources/microsoft-expanded-cloud-logs-implementation-playbook&lt;/a&gt; )&lt;br/&gt;CISA released a 60 page [Microsoft Expanded Cloud Logs Implementation Playbook](&lt;a href=&#34;https://www.cisa.gov/sites/default/files/2025-01/microsoft-expanded-cloud-logs-implementation-playbook-508c.pdf&#34;&gt;https://www.cisa.gov/sites/default/files/2025-01/microsoft-expanded-cloud-logs-implementation-playbook-508c.pdf&lt;/a&gt; ) (PDF) to help organizations get the most out of Microsoft’s newly introduced logs in Microsoft Purview Audit (Standard). This step-by-step guide enables technical personnel to better detect and defend against advanced intrusion techniques by operationalizing expanded cloud logs.&lt;br/&gt;&lt;br/&gt;#microsoft #cisa #securitybestpractice #cloudsecurity #infosec #cybersecurity
    </content>
    <updated>2025-01-15T19:54:51Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv8zqm8ve3q2wafxwtqwu2jksm90qkj8lt7k43zjuyermwhay8a0szyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyx7v3nk</id>
    
      <title type="html">**Trend Micro**: [Investigating A Web Shell Intrusion With Trend ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv8zqm8ve3q2wafxwtqwu2jksm90qkj8lt7k43zjuyermwhay8a0szyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyx7v3nk" />
    <content type="html">
      **Trend Micro**: [Investigating A Web Shell Intrusion With Trend Micro™ Managed XDR](&lt;a href=&#34;https://www.trendmicro.com/en_us/research/25/a/investigating-a-web-shell-intrusion-with-trend-micro--managed-xd.html&#34;&gt;https://www.trendmicro.com/en_us/research/25/a/investigating-a-web-shell-intrusion-with-trend-micro--managed-xd.html&lt;/a&gt; )&lt;br/&gt;Trend Micro provides a case study of a security incident where an attacker’s webshell sent to an unrestricted IIS worker led to the customer&amp;#39;s server compromise and multiple payloads being deployed, and payment information being exfiltrated. Indicators of compromise are provided.&lt;br/&gt;&lt;br/&gt;#threatintel #ioc #threatintel #infosec #cybersecurity #cyberthreatintelligence #CTI
    </content>
    <updated>2025-01-15T15:15:23Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqst6hr2apku6f5xgdang4gr707yctuw6qqcs5hr6sak90shkm46ntczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy6mk5mw</id>
    
      <title type="html">Note that Fortinet&amp;#39;s security advisory has Indicators of ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqst6hr2apku6f5xgdang4gr707yctuw6qqcs5hr6sak90shkm46ntczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy6mk5mw" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswtuw0x3dzqg6wgl9jk0q883psyjrdp0cvuacn3eu2xsf8myfm5fq097tta&#39;&gt;nevent1q…7tta&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Note that Fortinet&amp;#39;s security advisory has Indicators of Compromise, of which 3 out of 5 IP addresses overlap with **Arctic Wolf** reporting from 10 January 2025: [Console Chaos: A Campaign Targeting Publicly Exposed Management Interfaces on Fortinet FortiGate Firewalls](&lt;a href=&#34;https://arcticwolf.com/resources/blog-uk/campaign-targeting-publicly-exposed-management-interfaces-on-fortinet-fortigate-firewalls/&#34;&gt;https://arcticwolf.com/resources/blog-uk/campaign-targeting-publicly-exposed-management-interfaces-on-fortinet-fortigate-firewalls/&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;While its use in a ransomware campaign [hasn&amp;#39;t been confirmed](&lt;a href=&#34;https://techcrunch.com/2025/01/14/hackers-are-exploiting-a-new-fortinet-firewall-bug-to-breach-company-networks/&#34;&gt;https://techcrunch.com/2025/01/14/hackers-are-exploiting-a-new-fortinet-firewall-bug-to-breach-company-networks/&lt;/a&gt; ) by Arctic Wolf, &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1lcc6wn885u6k395x5j5tmdm94r6dh9zajxm8gyk82pv2s2j3el7sc6lcye&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Kevin Beaumont&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1lcc…lcye&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;  notes [exploitation by a ransomware operator](&lt;a href=&#34;https://cyberplace.social/@GossiTheDog/113828060350738157&#34;&gt;https://cyberplace.social/@GossiTheDog/113828060350738157&lt;/a&gt; ):&lt;br/&gt;&lt;br/&gt;&amp;gt; they have a copy of an exploit and are using it for initial access and handing off for lateral movement.&lt;br/&gt;&lt;br/&gt;#CVE_2024_55591 #threatintel #ioc #fortinet #FortiProxy #fortios #zeroday #vulnerability #infosec #cybersecurity #cybersecurity #eitw #activeexploitation #cisakev #kev #cti #cyberthreatintelligence #infosec
    </content>
    <updated>2025-01-15T14:17:58Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstwweefg5nczksd63fnpwzg7wy0jkjy4rn0lfxgjda79kqgnqz2ugzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsycca4v0</id>
    
      <title type="html">Happy #PatchTuesday from **Google** Chrome: [Stable Channel ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstwweefg5nczksd63fnpwzg7wy0jkjy4rn0lfxgjda79kqgnqz2ugzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsycca4v0" />
    <content type="html">
      Happy #PatchTuesday from **Google** Chrome: [Stable Channel Update for Desktop](&lt;a href=&#34;https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html&#34;&gt;https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html&lt;/a&gt; )&lt;br/&gt;Chrome 132.0.6834.83 (Linux) and 132.0.6834.83/84( Windows, Mac) contain 16 security fixes, 13 were externally reported: 5 high, 5 medium and 3 low severity. No mention of [exploitation](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; )&lt;br/&gt;&lt;br/&gt;#infosec #chrome #chromium #google #vulnerability #cybersecurity #CVE
    </content>
    <updated>2025-01-14T23:42:33Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrcq9cfxa2ngmr3l4e672vak8qa609v3uvqmx4w6p0ycyhuvew0nczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyp8dcay</id>
    
      <title type="html">Happy #PatchTuesday from **Zyxel**: [Zyxel security advisory for ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrcq9cfxa2ngmr3l4e672vak8qa609v3uvqmx4w6p0ycyhuvew0nczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyp8dcay" />
    <content type="html">
      Happy #PatchTuesday from **Zyxel**:  [Zyxel security advisory for improper privilege management vulnerability in APs and security router devices](&lt;a href=&#34;https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-improper-privilege-management-vulnerability-in-aps-and-security-router-devices-01-14-2025&#34;&gt;https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-improper-privilege-management-vulnerability-in-aps-and-security-router-devices-01-14-2025&lt;/a&gt; )&lt;br/&gt;CVE-2024-12398 (8.8 high) An improper privilege management vulnerability in the web management interface of the Zyxel WBE530 firmware versions through 7.00(ACLE.3) and WBE660S firmware versions through 6.70(ACGG.2) could allow an authenticated user with limited privileges to escalate their privileges to that of an administrator, enabling them to upload configuration files to a vulnerable device.&lt;br/&gt;&lt;br/&gt;There is no mention of [exploitation](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;#zyxel #cve #vulnerability #infosec #cybersecurity
    </content>
    <updated>2025-01-14T19:30:33Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8jk7jz6593fn6rcdv3yv4kft2h6gty7m52u8h04p92rz9qv58mcszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyradkaf</id>
    
      <title type="html">Happy #PatchTuesday from **Microsoft: SEVEN ZERO-DAYS** (3 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8jk7jz6593fn6rcdv3yv4kft2h6gty7m52u8h04p92rz9qv58mcszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyradkaf" />
    <content type="html">
      Happy #PatchTuesday from **Microsoft: SEVEN ZERO-DAYS** (3 exploited, 4 publicly disclosed, 159 new CVEs)&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334&amp;#34&#34;&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-21334&amp;lt;/a&amp;gt; (7.8 high) Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability (EXPLOITED)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21333&amp;#34&#34;&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21333&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-21333&amp;lt;/a&amp;gt; (7.8 high) Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability (EXPLOITED)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21335&amp;#34&#34;&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21335&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-21335&amp;lt;/a&amp;gt; (7.8 high) Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability (EXPLOITED)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21308&amp;#34&#34;&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21308&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-21308&amp;lt;/a&amp;gt; (6.5 medium) Windows Themes Spoofing Vulnerability (PUBLICLY DISCLOSED)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21275&amp;#34&#34;&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21275&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-21275&amp;lt;/a&amp;gt; (7.8 high) Windows App Package Installer Elevation of Privilege Vulnerability (PUBLICLY DISCLOSED)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21186&amp;#34&#34;&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21186&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-21186&amp;lt;/a&amp;gt; (7.8 high) Microsoft Access Remote Code Execution Vulnerability (PUBLICLY DISCLOSED)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21395&amp;#34&#34;&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21395&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-21395&amp;lt;/a&amp;gt; (7.8 high) Microsoft Access Remote Code Execution Vulnerability (PUBLICLY DISCLOSED)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21366&amp;#34&#34;&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21366&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2025-21366&amp;lt;/a&amp;gt; (7.8 high) Microsoft Access Remote Code Execution Vulnerability (PUBLICLY DISCLOSED)&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;cc: &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub17ladwxy5u4yzn9nspegp8u9xjzh35529wc2zgrfpnft3ax0wv8uskq5j4p&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;GoatYell group&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub17la…5j4p&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;br/&gt;&lt;br/&gt;#microsoft #vulnerability #zeroday #eitw #activeexploitation #infosec #cve #cybersecurity
    </content>
    <updated>2025-01-14T18:20:15Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsq03sfhyhg8dpf9vaxn8k9jx7yn09mt3ttnu4fhhevr87l8gwlplszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyc84t0t</id>
    
      <title type="html">Happy #PatchTuesday from **Ivanti**: [January Security ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsq03sfhyhg8dpf9vaxn8k9jx7yn09mt3ttnu4fhhevr87l8gwlplszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyc84t0t" />
    <content type="html">
      Happy #PatchTuesday from **Ivanti**: [January Security Update](&lt;a href=&#34;https://www.ivanti.com/blog/january-security-update&#34;&gt;https://www.ivanti.com/blog/january-security-update&lt;/a&gt; )&lt;br/&gt;Bottom line up front: &amp;#34;We have no evidence of any of these vulnerabilities being exploited in the wild.&amp;#34;&lt;br/&gt;Links: &amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-7-Multiple-CVEs?language=en_US&amp;#34&#34;&gt;https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-7-Multiple-CVEs?language=en_US&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Security Advisory Ivanti Avalanche 6.4.7 (Multiple CVEs)&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Application-Control-Engine-CVE-2024-10630?language=en_US&amp;#34&#34;&gt;https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Application-Control-Engine-CVE-2024-10630?language=en_US&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Security Advisory - Ivanti Application Control Engine (CVE-2024-10630)&amp;lt;/a&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;&amp;lt;em&amp;gt;(AC Engine is present on Ivanti Application Control, Ivanti Neurons for App Control and can integrate with Ivanti Security Controls and Ivanti Endpoint Manager)&amp;lt;/em&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US&amp;#34&#34;&gt;https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Security Advisory EPM January 2025 for EPM 2024 and EPM 2022 SU6&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;These are unrelated to the zero-day exploitation of CVE-2025-0282 inside of [Ivanti Connect Security, Policy Secure and ZTA Gateways](&lt;a href=&#34;https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283?language=en_US&#34;&gt;https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283?language=en_US&lt;/a&gt; ) advisory from 08 January 2025. &lt;br/&gt;&lt;br/&gt;#ivanti #vulnerability #cve #infosec #cybersecurity
    </content>
    <updated>2025-01-14T15:24:42Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0gyy46v0fk2p9k74vf6794f9rydedddn8p0gst6gz9edahpq32gqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsykpg3hj</id>
    
      <title type="html">The rest of the #PatchTuesday security advisories from ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0gyy46v0fk2p9k74vf6794f9rydedddn8p0gst6gz9edahpq32gqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsykpg3hj" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswtuw0x3dzqg6wgl9jk0q883psyjrdp0cvuacn3eu2xsf8myfm5fq097tta&#39;&gt;nevent1q…7tta&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;The rest of the #PatchTuesday security advisories from **Fortinet**:&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-239&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-239&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Admin Account Persistence after Deletion&amp;lt;/a&amp;gt; CVE-2024-47571 (8.1 high)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-143&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-143&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Arbitrary file delete on firmware import image feature&amp;lt;/a&amp;gt; CVE-2024-33502 (6.5 medium)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-097&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-097&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Arbitrary file deletion in administrative interface&amp;lt;/a&amp;gt; CVE-2024-32115 (5.5 medium)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-152&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-152&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Arbitrary file write on GUI&amp;lt;/a&amp;gt; CVE-2024-36512 (7.2 high)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-417&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-417&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Blind SQL injection in Update&amp;lt;/a&amp;gt; CVE-2024-52969 (4.1 medium)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-23-220&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-23-220&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Blind SQL injection vulnerability&amp;lt;/a&amp;gt; CVE-2023-37931 (8.8 high)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-23-381&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-23-381&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2023-4863 - Heap overflow in Chrome/libwebp&amp;lt;/a&amp;gt; CVE-2023-4863 (&amp;#34;7.5 high&amp;#34; / NVD 8.8 high)&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;bruv I recognize a historical exploited zero-day when I see one&amp;lt;/strong&amp;gt;: &amp;lt;a href=&amp;#34;&lt;a href=&#34;https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html&amp;#34&#34;&gt;https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;CVE-2023-4863&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-222&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-222&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Command injection in csfd daemon&amp;lt;/a&amp;gt; CVE-2024-46662 (8.8 high)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-164&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-164&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Denial of Service in TLS-SYSLOG handler&amp;lt;/a&amp;gt; CVE-2024-46667 (7.5 high)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-23-476&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-23-476&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;EMS console login under brute force attack does not get locked&amp;lt;/a&amp;gt; CVE-2024-23106 (8.1 high)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-326&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-326&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Exposure of sensitive information in RADIUS Accounting-Request&amp;lt;/a&amp;gt; CVE-2024-46665 (3.7 low)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-282&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-282&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;File-Filter Bypass in Explicit Web Proxy Policy&amp;lt;/a&amp;gt; CVE-2024-54021 (6.5 medium)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-23-405&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-23-405&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FortiAP - Restricted Shell Escape via CLI Command Injection&amp;lt;/a&amp;gt; CVE-2024-26012 (6.7 medium)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-23-458&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-23-458&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;FortiWeb - Stack overflow in execute backup command&amp;lt;/a&amp;gt; CVE-2024-21758 (6.4 medium)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-211&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-211&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;HTML Content Injection&amp;lt;/a&amp;gt; CVE-2024-52967 (3.5 low)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-216&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-216&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Hardcoded Encryption Key Used for Named Pipe Communication&amp;lt;/a&amp;gt; CVE-2024-50564 (3.3 low)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-23-260&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-23-260&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Hardcoded Session Secret Leading to Unauthenticated Remote Code Execution&amp;lt;/a&amp;gt; CVE-2023-37936 (&amp;lt;strong&amp;gt;9.8 critical&amp;lt;/strong&amp;gt;)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-23-407&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-23-407&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;IPsec dynamic assignation IP spoofing&amp;lt;/a&amp;gt; CVE-2023-46715 (5.0 medium)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-210&amp;#34&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-210&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34;&amp;gt;Improper Neutralization of Formula Elements in a CSV File&amp;lt;/a&amp;gt; CVE-2024-47572 (&amp;lt;strong&amp;gt;9.0 critical&amp;lt;/strong&amp;gt;)&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;Notes: Other than the zero-day [CVE-2024-55591](&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-535&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-535&lt;/a&gt; ), there is no other mention of [exploitation](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; ).&lt;br/&gt;&lt;br/&gt;#fortinet #vulnerability #infosec #cybersecurity #cve
    </content>
    <updated>2025-01-14T15:13:32Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf529p7g09fm20wsqs8snnufs23yhac0txv0yqgvezrlwrfucss7gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyrjtyru</id>
    
      <title type="html">if you&amp;#39;re referring to the URL you mentioned the other day, ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf529p7g09fm20wsqs8snnufs23yhac0txv0yqgvezrlwrfucss7gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyrjtyru" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2cug376me3n5jxw00wd2ky3x4c2sf79p9lzhjn7wy6nwyepuz44ssyg2pf&#39;&gt;nevent1q…g2pf&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;if you&amp;#39;re referring to the URL you mentioned the other day, it&amp;#39;s available and does not explicitly mention exploitation 🤔 &lt;a href=&#34;https://www.fortiguard.com/psirt/FG-IR-24-266&#34;&gt;https://www.fortiguard.com/psirt/FG-IR-24-266&lt;/a&gt;
    </content>
    <updated>2025-01-14T15:02:32Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswtuw0x3dzqg6wgl9jk0q883psyjrdp0cvuacn3eu2xsf8myfm5fqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy8ml8df</id>
    
      <title type="html">Happy #ZeroDay from your friends at **Fortinet**: [Authentication ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswtuw0x3dzqg6wgl9jk0q883psyjrdp0cvuacn3eu2xsf8myfm5fqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy8ml8df" />
    <content type="html">
      Happy #ZeroDay from your friends at **Fortinet**: [Authentication bypass in Node.js websocket module](&lt;a href=&#34;https://fortiguard.fortinet.com/psirt/FG-IR-24-535&#34;&gt;https://fortiguard.fortinet.com/psirt/FG-IR-24-535&lt;/a&gt; )&lt;br/&gt;CVE-2024-55591 (CVSSv3.1: **9.8 critical**) An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy may allow a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.&lt;br/&gt;&lt;br/&gt;&amp;gt; Please note that reports show this is being exploited in the wild.&lt;br/&gt;&lt;br/&gt;Indicators of compromise include possible log entries, IP addresses used, and admin accounts created. cc: &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1lcc6wn885u6k395x5j5tmdm94r6dh9zajxm8gyk82pv2s2j3el7sc6lcye&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Kevin Beaumont&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1lcc…lcye&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub12xhpqz0ygq7cy87pcyhpf06tgr0yf37uv9mcnzzqeg00n70tca5q0vzxeq&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Will Dormann&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub12xh…zxeq&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1s6eewzr2zvz3ppsa6k8j2hadamsug7q4rp068wmz3grtf440xxkqr8n008&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;cR0w :cascadia: :gayint: 🏴‍☠️&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1s6e…n008&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1vc39pnjdqd77zzdxff4qyv8h3x0ey2mkx33c3vl8egr0a9ysxkxsk0axsh&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;BrianKrebs&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1vc3…axsh&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;br/&gt;&lt;br/&gt;#zeroday #patchtuesday #fortinet #vulnerability #CVE_2024_55591 #infosec #ioc #threatintel #infosec #cybersecurity #
    </content>
    <updated>2025-01-14T14:26:32Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspn2pkep75xvpa47jdjlq3hgjq9gtyux8ashnz8csup6z408mklpszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy2w8h4m</id>
    
      <title type="html">**CrowdStrike**: [Recruitment Phishing Scam Imitates CrowdStrike ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspn2pkep75xvpa47jdjlq3hgjq9gtyux8ashnz8csup6z408mklpszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy2w8h4m" />
    <content type="html">
      **CrowdStrike**: [Recruitment Phishing Scam Imitates CrowdStrike Hiring Process](&lt;a href=&#34;https://www.crowdstrike.com/en-us/blog/recruitment-phishing-scam-imitates-crowdstrike-hiring-process/&#34;&gt;https://www.crowdstrike.com/en-us/blog/recruitment-phishing-scam-imitates-crowdstrike-hiring-process/&lt;/a&gt; )&lt;br/&gt;Following CrowdStrike&amp;#39;s successful Denial of Service attack on customers&amp;#39; Windows systems worldwide in July 2024, recruitment has gone up (this is a joke). CrowdStrike reports that a newly discovered phishing campaign uses CrowdStrike recruitment branding to convince victims to download a fake application, which serves as a downloader for the XMRig cryptominer. They describe the infection chain and provide Indicators of Compromise.&lt;br/&gt;&lt;br/&gt;#crowdstrike #IOC #xmrig #cryptomining #infosec #cybersecurity #cyberthreatintelligence #CTI
    </content>
    <updated>2025-01-09T14:37:59Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswwls2qky5jau68y4f6mq30jfpdzn824mxy6fqe6vy2puxtcw5cpqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy6swxw5</id>
    
      <title type="html">**Mozilla Foundation** security advisories 09 January ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswwls2qky5jau68y4f6mq30jfpdzn824mxy6fqe6vy2puxtcw5cpqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy6swxw5" />
    <content type="html">
      **Mozilla Foundation** security advisories 09 January 2025:&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.mozilla.org/en-US/security/advisories/mfsa2025-04/&amp;#34&#34;&gt;https://www.mozilla.org/en-US/security/advisories/mfsa2025-04/&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;MFSA2025-04&amp;lt;/a&amp;gt; Security Vulnerabilities fixed in Thunderbird 134 (9 CVEs: 2 high, 7 &amp;#34;moderate&amp;#34;)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.mozilla.org/en-US/security/advisories/mfsa2025-05/&amp;#34&#34;&gt;https://www.mozilla.org/en-US/security/advisories/mfsa2025-05/&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;MFSA2025-05&amp;lt;/a&amp;gt; Security Vulnerabilities fixed in Thunderbird ESR 128.6 (7 CVEs: 1 high, 6 moderate)&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;No [mention](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; ) of exploitation.&lt;br/&gt;&lt;br/&gt;#mozilla #thunderbird #vulnerability #cve #infosec #cybersecurity
    </content>
    <updated>2025-01-09T12:11:03Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs835q2ha3q8ukh7rvraws0g35awp2ahhqwp2385svgr5c22pqp88czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyzqjp24</id>
    
      <title type="html">Ivanti zero-day mega-toot:&amp;lt;li&amp;gt;Ivanti blog post: &amp;lt;a ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs835q2ha3q8ukh7rvraws0g35awp2ahhqwp2385svgr5c22pqp88czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyzqjp24" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsrfj27rfadzlfd4x4wq9t5p5xk4hh7wf5fnp56gycjqx79vvmpwwsurp2kl&#39;&gt;nevent1q…p2kl&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Ivanti zero-day mega-toot:&amp;lt;li&amp;gt;Ivanti blog post: &amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.ivanti.com/blog/security-update-ivanti-connect-secure-policy-secure-and-neurons-for-zta-gateways&amp;#34&#34;&gt;https://www.ivanti.com/blog/security-update-ivanti-connect-secure-policy-secure-and-neurons-for-zta-gateways&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;Security Update: Ivanti Connect Secure, Policy Secure and Neurons for ZTA Gateways&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Ivanti security advisory: &amp;lt;a href=&amp;#34;&lt;a href=&#34;https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283?language=en_US&amp;#34&#34;&gt;https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283?language=en_US&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;Security Advisory Ivanti Connect Secure, Policy Secure &amp;amp;amp; ZTA Gateways (CVE-2025-0282, CVE-2025-0283)&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;U.S. CISA mitigation guidance: &amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cisa.gov/cisa-mitigation-instructions-cve-2025-0282&amp;#34&#34;&gt;https://www.cisa.gov/cisa-mitigation-instructions-cve-2025-0282&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;CISA Mitigation Instructions for CVE-2025-0282&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Mandiant observed post-exploitation activity and forensics (includes IOC, Yara): &amp;lt;a href=&amp;#34;&lt;a href=&#34;https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day&amp;#34&#34;&gt;https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;Government security advisories:&amp;lt;li&amp;gt;U.S.: &amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cisa.gov/news-events/alerts/2025/01/08/ivanti-releases-security-updates-connect-secure-policy-secure-and-zta-gateways&amp;#34&#34;&gt;https://www.cisa.gov/news-events/alerts/2025/01/08/ivanti-releases-security-updates-connect-secure-policy-secure-and-zta-gateways&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;Ivanti Releases Security Updates for Connect Secure, Policy Secure, and ZTA Gateways&amp;lt;/a&amp;gt;; &amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cisa.gov/news-events/alerts/2025/01/08/cisa-adds-one-vulnerability-kev-catalog&amp;#34&#34;&gt;https://www.cisa.gov/news-events/alerts/2025/01/08/cisa-adds-one-vulnerability-kev-catalog&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;CISA Adds One Vulnerability to the KEV Catalog&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Canada: &amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cyber.gc.ca/en/alerts-advisories/ivanti-security-advisory-av25-008&amp;#34&#34;&gt;https://www.cyber.gc.ca/en/alerts-advisories/ivanti-security-advisory-av25-008&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;Ivanti security advisory (AV25-008)&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;UK: &amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.ncsc.gov.uk/news/active-exploitation-ivanti-vulnerabilities&amp;#34&#34;&gt;https://www.ncsc.gov.uk/news/active-exploitation-ivanti-vulnerabilities&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;Active exploitation of vulnerability affecting Ivanti Connect Secure&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;Regular infosec news reporting:&amp;lt;li&amp;gt;Security Week: &amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.securityweek.com/ivanti-warns-of-new-zero-day-attacks-hitting-connect-secure-product/&amp;#34&#34;&gt;https://www.securityweek.com/ivanti-warns-of-new-zero-day-attacks-hitting-connect-secure-product/&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;Ivanti Warns of New Zero-Day Attacks Hitting Connect Secure Product&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;The Record: &amp;lt;a href=&amp;#34;&lt;a href=&#34;https://therecord.media/ivanti-warns-of-hackers-exploiting-new-vulnerability&amp;#34&#34;&gt;https://therecord.media/ivanti-warns-of-hackers-exploiting-new-vulnerability&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;Ivanti warns hackers are exploiting new vulnerability&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Bleeping Computer: &amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-connect-secure-flaw-used-in-zero-day-attacks/&amp;#34&#34;&gt;https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-connect-secure-flaw-used-in-zero-day-attacks/&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;Ivanti warns of new Connect Secure flaw used in zero-day attacks&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;
    </content>
    <updated>2025-01-09T01:50:22Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2ssxq6t0yk3x6etydyn9nffqq64nydyml5pwmx05x5qulmtrz7kqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsycksm5y</id>
    
      <title type="html">all else fails I could just point at a random toot ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2ssxq6t0yk3x6etydyn9nffqq64nydyml5pwmx05x5qulmtrz7kqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsycksm5y" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswwfe4d7nvg9qxrgvhgce4pe7ukjs7x7fpne9hvz8sttcaxyh0w5cm8hdt4&#39;&gt;nevent1q…hdt4&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;all else fails I could just point at a random toot &lt;a href=&#34;https://cyberplace.social/@GossiTheDog/113687025051706838&#34;&gt;https://cyberplace.social/@GossiTheDog/113687025051706838&lt;/a&gt;
    </content>
    <updated>2025-01-08T20:23:53Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfp0tk9p0fj79t5vak45hemd74wa7fg9xa0jt5clxt3epe9hdp8cszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsynqpzzu</id>
    
      <title type="html">we could be talking about a different eitw. Fortinet tomorrow ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfp0tk9p0fj79t5vak45hemd74wa7fg9xa0jt5clxt3epe9hdp8cszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsynqpzzu" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs9gvk7js7xm4lqxrxk22c6c83qx2hq2ppvfg67788urmvx3d478kgu678n5&#39;&gt;nevent1q…78n5&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;we could be talking about a different eitw. Fortinet tomorrow kthx
    </content>
    <updated>2025-01-08T20:21:16Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrdhm3kc8w5usgskqut3hnhf2z2aul7gvquj25d6d8ky03kaen0rczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy9kd66a</id>
    
      <title type="html">CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H &amp;gt; A stack-based ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrdhm3kc8w5usgskqut3hnhf2z2aul7gvquj25d6d8ky03kaen0rczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy9kd66a" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsz4rq2ckr7cflyxtlw68dtl3xx38nwhgj4jvhrt7se4vwuctv438ge8mffr&#39;&gt;nevent1q…mffr&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H &lt;br/&gt;&lt;br/&gt;&amp;gt; A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution. &lt;br/&gt;&lt;br/&gt;It&amp;#39;s pretty self explanatory ¯\_(ツ)_/¯
    </content>
    <updated>2025-01-08T20:17:01Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswlzrpqvqawa8v5qqcn9u05n57a9uu0t390dk47cguxzcud6duwsczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy2v8akq</id>
    
      <title type="html">**GitLab** security advisory 08 January 2025: [GitLab Patch ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswlzrpqvqawa8v5qqcn9u05n57a9uu0t390dk47cguxzcud6duwsczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy2v8akq" />
    <content type="html">
      **GitLab** security advisory 08 January 2025: [GitLab Patch Release: 17.7.1, 17.6.3, 17.5.5](&lt;a href=&#34;https://about.gitlab.com/releases/2025/01/08/patch-release-gitlab-17-7-1-released/&#34;&gt;https://about.gitlab.com/releases/2025/01/08/patch-release-gitlab-17-7-1-released/&lt;/a&gt; )&amp;lt;li&amp;gt;CVE-2025-0194 (6.5 medium) Possible access token exposure in GitLab logs&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;CVE-2024-6324 (4.3 medium) Cyclic reference of epics leads resource exhaustion&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;CVE-2024-12431 (4.3 medium) Unauthorized user can manipulate status of issues in public projects&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;CVE-2024-13041 (4.3 medium) Instance SAML does not respect external_provider configuration&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;No [mention of exploitation](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; )&lt;br/&gt;&lt;br/&gt;#gitlab #vulnerability #cve #infosec #cybersecurity
    </content>
    <updated>2025-01-08T16:11:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrrdul275yhuvkjervpkwmtstvnaxskqy49qn8r9dlsz2lxl25vfczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsypkgyyt</id>
    
      <title type="html">RUMINT is that Ivanti has exploited zero-days. Leaked on social ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrrdul275yhuvkjervpkwmtstvnaxskqy49qn8r9dlsz2lxl25vfczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsypkgyyt" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8vq6l5uxdnxxprsx97x3v33353erspum5059fjvcrxr6stu5620gfj2h84&#39;&gt;nevent1q…2h84&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;RUMINT is that Ivanti has exploited zero-days. Leaked on social media (broke embargo) and then deleted.
    </content>
    <updated>2025-01-08T14:50:25Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9055nqh2fpyxls9es32wqgyf0fde2r76rtc2ycxlrulj73yhl4pczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyr8na30</id>
    
      <title type="html">**Google** Chrome security advisory: [Stable Channel Update for ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9055nqh2fpyxls9es32wqgyf0fde2r76rtc2ycxlrulj73yhl4pczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyr8na30" />
    <content type="html">
      **Google** Chrome security advisory: [Stable Channel Update for Desktop](&lt;a href=&#34;https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop.html&#34;&gt;https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop.html&lt;/a&gt; )&lt;br/&gt;New Google Chrome version 131.0.6778.264/.265 for Windows, Mac and 131.0.6778.264 for Linux includes 4 security fixes, including 1 externally reported: CVE-2025-0291 (high severity) Type Confusion in V8. No [mention of exploitation](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; )&lt;br/&gt;&lt;br/&gt;#google #chrome #vulnerability #cve #infosec #cybersecurity #CVE_2025_0291
    </content>
    <updated>2025-01-07T19:02:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9p27h327xdv2uzt4kns5plqvlhzc539andselqrxjrjsuc398yrszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy62vdgc</id>
    
      <title type="html">??? You&amp;#39;re missing one: ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9p27h327xdv2uzt4kns5plqvlhzc539andselqrxjrjsuc398yrszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy62vdgc" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsgh4fze7pcujlm7pgumqenul9rgsy48t9q0s4pdzj7z4ej8zhqq2g0dujfa&#39;&gt;nevent1q…ujfa&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;??? You&amp;#39;re missing one: [CVE-2020-2883](&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2020-2883&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2020-2883&lt;/a&gt; ) (**9.8 critical**) Oracle WebLogic Server Unspecified Vulnerability&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.cisa.gov/news-events/alerts/2025/01/07/cisa-adds-three-known-exploited-vulnerabilities-catalog&#34;&gt;https://www.cisa.gov/news-events/alerts/2025/01/07/cisa-adds-three-known-exploited-vulnerabilities-catalog&lt;/a&gt;
    </content>
    <updated>2025-01-07T16:08:09Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsts8067psq4znnfv52h038mt4zafs8uxv6radxhm3cg0mcpdw2r6czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyvsr9rd</id>
    
      <title type="html">the real reason to carry two guns: To fire two guns while jumping ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsts8067psq4znnfv52h038mt4zafs8uxv6radxhm3cg0mcpdw2r6czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyvsr9rd" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsr6rvt9kx9knvy8wgtfuxuewq7xt0h68ey6l5sqezzya4qctvxrkst9g05a&#39;&gt;nevent1q…g05a&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;the real reason to carry two guns: To fire two guns while jumping through the air: &lt;a href=&#34;https://www.youtube.com/watch?v=r9d_sLRXOH4&#34;&gt;https://www.youtube.com/watch?v=r9d_sLRXOH4&lt;/a&gt;
    </content>
    <updated>2025-01-03T16:59:15Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqspud6ck42rkhe7jgcxgvnj8fq9zfcuvexjgxyqgq374060275arcczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy27sak5</id>
    
      <title type="html">**U.S. Treasury**: [Treasury Sanctions Technology Company for ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqspud6ck42rkhe7jgcxgvnj8fq9zfcuvexjgxyqgq374060275arcczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy27sak5" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs2w8gvx5nem56vp35hpfh9pfv7cfksjc7788pgn0xy0v3t2fkhrns3mxr5r&#39;&gt;nevent1q…xr5r&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;**U.S. Treasury**: [Treasury Sanctions Technology Company for Support to Malicious Cyber Group](&lt;a href=&#34;https://home.treasury.gov/news/press-releases/jy2769&#34;&gt;https://home.treasury.gov/news/press-releases/jy2769&lt;/a&gt; )&lt;br/&gt;Treasury bites back at China: the Office of Foreign Assets Control (OFAC) sanctioned Integrity Technology Group, Incorporated (Integrity Tech), a Beijing-based cybersecurity company, for its role in multiple computer intrusion incidents against U.S. victims. These incidents have been publicly attributed to Flax Typhoon, a Chinese malicious state-sponsored cyber group that has been active since at least 2021, often targeting organizations within U.S. critical infrastructure sectors.&lt;br/&gt;&lt;br/&gt;&amp;gt; Between summer 2022 and fall 2023, Flax Typhoon actors used infrastructure tied to Integrity Tech during their computer network exploitation activities against multiple victims. During that time, Flax Typhoon routinely sent and received information from Integrity Tech infrastructure.&lt;br/&gt;&lt;br/&gt;See the joint FBI, CNMF and NSA advisory [People’s Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations](&lt;a href=&#34;https://www.ic3.gov/Media/News/2024/240918.pdf&#34;&gt;https://www.ic3.gov/Media/News/2024/240918.pdf&lt;/a&gt; ) (PDF) from 18 September 2024. cc: &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub13gzvwesf2hll57r82wh9hkx87udkz09z2ar5jn56d05n5f2xp9yst6eks3&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Natto Thoughts&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub13gz…eks3&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;&lt;br/&gt;&lt;br/&gt;#integritytech #ofac #treasury #sanctions #china #flaxtyphoon #cyberespionage #threatintel #infosec #cybersecurity #cyberthreatintelligence #CTI
    </content>
    <updated>2025-01-03T16:36:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszy3gh205dvufsu57z556n5hdayav2rdjyu5wcdrfa2a6jm8lpa2qzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyh7dspq</id>
    
      <title type="html">the vulnerability reporter Yuki Chen says CVE-2024-49113 is ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszy3gh205dvufsu57z556n5hdayav2rdjyu5wcdrfa2a6jm8lpa2qzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyh7dspq" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs948e8cfelgrq094y8krdrck9y2xw65j6lry5jy6yujkwsm3cv23qskj2fn&#39;&gt;nevent1q…j2fn&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;the vulnerability reporter Yuki Chen says CVE-2024-49113 is incorrectly tagged as Denial of Service when it should be &amp;#34;information leak&amp;#34;: &lt;a href=&#34;https://twitter.com/guhe120/status/1874605842353594579&#34;&gt;https://twitter.com/guhe120/status/1874605842353594579&lt;/a&gt;
    </content>
    <updated>2025-01-02T22:07:03Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8udxmwt2pu43wcz379zc3mhufpz2c4y38tm0n7sl426a2p9sh04gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyan8pwr</id>
    
      <title type="html">**Progress** security advisory: [WhatsUp Gold Security Bulletin ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8udxmwt2pu43wcz379zc3mhufpz2c4y38tm0n7sl426a2p9sh04gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyan8pwr" />
    <content type="html">
      **Progress** security advisory: [WhatsUp Gold Security Bulletin December 2024](&lt;a href=&#34;https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-December-2024&#34;&gt;https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-December-2024&lt;/a&gt; )&lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1s6eewzr2zvz3ppsa6k8j2hadamsug7q4rp068wmz3grtf440xxkqr8n008&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;cR0w :cascadia: :gayint: 🏴‍☠️&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1s6e…n008&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; Progress allegedly published this advisory 12 December 2024, but the page wasn&amp;#39;t available from Google search results (thank Gemini AI ✨ for being useless) and Progress doesn&amp;#39;t maintain a dedicated security advisories section on their website. Anyway, this page hasn&amp;#39;t been updated with new information since 12 December so it&amp;#39;s also useless. Here are the three vulnerabilities:&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://cve.org/CVERecord?id=CVE-2024-12105&amp;#34&#34;&gt;https://cve.org/CVERecord?id=CVE-2024-12105&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;CVE-2024-12105&amp;lt;/a&amp;gt; (6.5 medium) authenticated information disclosure via specially crafted HTTP request&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://cve.org/CVERecord?id=CVE-2024-12106&amp;#34&#34;&gt;https://cve.org/CVERecord?id=CVE-2024-12106&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;CVE-2024-12106&amp;lt;/a&amp;gt; (&amp;lt;strong&amp;gt;9.4 critical&amp;lt;/strong&amp;gt;) unauthenticated attacker can configure LDAP settings&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://cve.org/CVERecord?id=CVE-2024-12108&amp;#34&#34;&gt;https://cve.org/CVERecord?id=CVE-2024-12108&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;CVE-2024-12108&amp;lt;/a&amp;gt; (&amp;lt;strong&amp;gt;9.6 critical&amp;lt;/strong&amp;gt;) an attacker can gain access to the WhatsUp Gold server via the public API&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;No mention of exploitation. Patched in WhatsUp Gold version 24.0.2&lt;br/&gt;&lt;br/&gt;#infosec #progress #whatsupgold #cve #vulnerability #cybersecurity
    </content>
    <updated>2025-01-02T15:34:58Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqm745cc2q5nfygehawtnlpzvart307aetkqysjr45pdp04y0ewnszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsylfsrr0</id>
    
      <title type="html">&amp;gt; our own &amp;gt; [&amp;gt; @&amp;gt; ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqm745cc2q5nfygehawtnlpzvart307aetkqysjr45pdp04y0ewnszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsylfsrr0" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs0404cq3fjhs3s0e4exer8sl0tdqg0fh6q3fj3jyh9ktn0t9xmeucngjpnk&#39;&gt;nevent1q…jpnk&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;&amp;gt; our own &amp;gt; [&amp;gt; @&amp;gt; GossiTheDog](&lt;a href=&#34;https://cyberplace.social/@GossiTheDog&#34;&gt;https://cyberplace.social/@GossiTheDog&lt;/a&gt; )&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/751/694/137/301/556/original/60f04e8b382f916f.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-01-01T06:32:13Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2z455pvg73r5cg02l4v5te0hc6axlsxrwhdu03wtlcc7xvsahtsszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsytu6erd</id>
    
      <title type="html">Awesome news! I absolutely love the quote from @npub1elw…a2f2: ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2z455pvg73r5cg02l4v5te0hc6axlsxrwhdu03wtlcc7xvsahtsszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsytu6erd" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsv75yvtqtm8gum26cf87zz4rlwunh6uz9vae2hnuqeerhmvfr0jwqgayx72&#39;&gt;nevent1q…yx72&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Awesome news! I absolutely love the quote from &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1elwmm8zdg3fzj2ak0gwxa5jxt2fhrt5fh3t6ayq3yuq8gwd993pqvpa2f2&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Allison Nixon&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1elw…a2f2&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;:&lt;br/&gt;&lt;br/&gt;&amp;gt; “I know that young people involved in cybercrime will read these articles,” Nixon said. “You need to stop doing stupid shit and get a lawyer. Law enforcement wants to put all of you in prison for a long time.”
    </content>
    <updated>2024-12-31T04:18:48Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdpc852w78pmkal6fahxru37dnac0v3esffg4h6h7cq8k5ddnvfxqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyl46e3h</id>
    
      <title type="html">the source is &amp;#34;nsa_employee39&amp;#34; who posted this on the ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdpc852w78pmkal6fahxru37dnac0v3esffg4h6h7cq8k5ddnvfxqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyl46e3h" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsrut5x0azy6kp86mzj2kmprwn74020cm8uaqp746w7nxdzkruy8uq0klzmx&#39;&gt;nevent1q…lzmx&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;the source is &amp;#34;nsa_employee39&amp;#34; who posted this on the [Bad Place](&lt;a href=&#34;https://twitter.com/NSA_Employee39/status/1873644808998367272&#34;&gt;https://twitter.com/NSA_Employee39/status/1873644808998367272&lt;/a&gt; )™:&lt;br/&gt;&lt;br/&gt;&amp;gt; Hey guys, as a thank you to all the new followers, I will be dropping 0days all this week until MyBB.&lt;br/&gt;&lt;br/&gt;&amp;gt; Here&amp;#39;s a ACE vulnerability in 7zip.&lt;br/&gt;&lt;br/&gt;The 7zip developer Igor Pavlov is disputing it: &lt;a href=&#34;https://sourceforge.net/p/sevenzip/bugs/2539/&#34;&gt;https://sourceforge.net/p/sevenzip/bugs/2539/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&amp;gt; This report on Twitter is fake.&lt;br/&gt;&amp;gt; And I don&amp;#39;t understand why this Twitter user did this.&lt;br/&gt;&lt;br/&gt;&amp;gt; There is no such ACE vulnerability in 7-Zip / LZMA.&lt;br/&gt;&lt;br/&gt;cc: &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1s6eewzr2zvz3ppsa6k8j2hadamsug7q4rp068wmz3grtf440xxkqr8n008&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;cR0w :cascadia: :gayint: 🏴‍☠️&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1s6e…n008&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;
    </content>
    <updated>2024-12-30T14:22:44Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqwale7qt0kx8d6h49gkk992lzw2jw2f3hq2l9c5pzeukcny5xd5czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsym3hrdr</id>
    
      <title type="html">I saw this over at the Bad Place™ and thought of you (no ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqwale7qt0kx8d6h49gkk992lzw2jw2f3hq2l9c5pzeukcny5xd5czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsym3hrdr" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsxujaddvw0yz3sm2h3u2wjq0hq6pd3dkx6kexmsg6jxw2dft3n3scsvhge3&#39;&gt;nevent1q…hge3&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I saw this over at the Bad Place™ and thought of  you (no offense intended)&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/733/448/407/028/091/original/e9ac201ce0daa86b.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2024-12-29T01:14:22Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszrqzn94x5nv30kundpre9e6hhp4xw936l5rzgnskvadndwv72psgzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyae0396</id>
    
      <title type="html">**VulnCheck**: [Four-Faith Industrial Router CVE-2024-12856 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszrqzn94x5nv30kundpre9e6hhp4xw936l5rzgnskvadndwv72psgzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyae0396" />
    <content type="html">
      **VulnCheck**: [Four-Faith Industrial Router CVE-2024-12856 Exploited in the Wild](&lt;a href=&#34;https://vulncheck.com/blog/four-faith-cve-2024-12856&#34;&gt;https://vulncheck.com/blog/four-faith-cve-2024-12856&lt;/a&gt; )&lt;br/&gt;[CVE-2024-12856](&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2024-12856&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2024-12856&lt;/a&gt; ) (7.2 high) Four-Faith Industrial Router post-auth command injection is a reported exploited zero-day. Suricata rule available, no IOC though.&lt;br/&gt;&lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1qzuk6k5w9ajvltt2f56pgy52uwddsf53ngmzqza6g9367jyc8cmsc6rvyk&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Tod Beardsley&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1qzu…rvyk&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; there are still 2 more weekdays left in 2024, cram it all into the KEV!&lt;br/&gt;&lt;br/&gt;#vulnerability #fourfaith #cve #eitw #activeexploitation #CVE_2024_12856 #infosec #cybersecurity
    </content>
    <updated>2024-12-28T17:36:53Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvl4n49l0d8pmecccpyqsejmqhyc6y2hjts8tnjgczmztv9fdca3czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyhh72ke</id>
    
      <title type="html">Merry fucking Christmas from **Palo Alto Networks (Zero-Day)**: ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvl4n49l0d8pmecccpyqsejmqhyc6y2hjts8tnjgczmztv9fdca3czyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyhh72ke" />
    <content type="html">
      Merry fucking Christmas from **Palo Alto Networks (Zero-Day)**: [CVE-2024-3393 PAN-OS: Firewall Denial of Service (DoS) in DNS Security Using a Specially Crafted Packet](&lt;a href=&#34;https://security.paloaltonetworks.com/CVE-2024-3393&#34;&gt;https://security.paloaltonetworks.com/CVE-2024-3393&lt;/a&gt; )&lt;br/&gt;[CVE-2024-3393](&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2024-3393&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2024-3393&lt;/a&gt; ) (CVSSv4: 8.7 high) A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.&lt;br/&gt;&lt;br/&gt;&amp;gt; Palo Alto Networks is aware of customers experiencing this denial of service (DoS) when their firewall blocks malicious DNS packets that trigger this issue.&lt;br/&gt;&lt;br/&gt;#zeroday #eitw #activeexploitation #vulnerability #paloaltonetworks #cve #CVE_2024_3393 #christmas
    </content>
    <updated>2024-12-27T04:00:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9zg6xalwy2kxpska3qkq8ma9r9nf9zu2cvc4e0mndm4m6gxh0vlqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyqgucrr</id>
    
      <title type="html">On the twelfth day of Christmas, the true goat gave to thee: ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9zg6xalwy2kxpska3qkq8ma9r9nf9zu2cvc4e0mndm4m6gxh0vlqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyqgucrr" />
    <content type="html">
      On the twelfth day of Christmas, the true goat gave to thee: &lt;a href=&#34;https://infosec.press/screaminggoat/patch-tuesday&#34;&gt;https://infosec.press/screaminggoat/patch-tuesday&lt;/a&gt; , which is a list of vendors&amp;#39; security advisory landing pages and their #PatchTuesday schedule.&lt;br/&gt;&lt;br/&gt;Disclaimer: Not every vendor is listed, and their patching cycle may be different than what I categorized them as, but it&amp;#39;s a good starting point. Ideally, you&amp;#39;d be tracking the ones you care about using RSS anyway.&lt;br/&gt;&lt;br/&gt;Merry Christmas Infosec Mastodon &lt;br/&gt;&lt;br/&gt;#iinfosec #cybersecurity #vulnerability #cve #christmas
    </content>
    <updated>2024-12-26T03:17:31Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsthwk3umy6ymhpcgc8s6v5a29l2y4f4vvpx6pduu26umpaktnfaxqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy0wlv43</id>
    
      <title type="html">Merry Christmas from the goat: [Vendor ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsthwk3umy6ymhpcgc8s6v5a29l2y4f4vvpx6pduu26umpaktnfaxqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy0wlv43" />
    <content type="html">
      Merry Christmas from the goat: [Vendor Verbiage](&lt;a href=&#34;https://infosec.press/screaminggoat/vendor-verbiage&#34;&gt;https://infosec.press/screaminggoat/vendor-verbiage&lt;/a&gt; ) is a list of common example messages used by software vendors to note that a vulnerability is publicly disclosed or exploited in the wild. This should come in handy when quickly scanning through security advisories on Patch Tuesday. Enjoy!&lt;br/&gt;&lt;br/&gt;#patchtuesday #zeroday #vulnerability #CVE #infosec #cybersecurity #proofofconcept #poc #eitw #activeexploitation
    </content>
    <updated>2024-12-23T23:36:52Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyk0zxrw6737huxht9enp7pf6qrt4md6fmc8vpn8r0ypn9kh0nx7gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsygkeaee</id>
    
      <title type="html">**Sophos** security advisory 19 December 2024: [Resolved Multiple ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyk0zxrw6737huxht9enp7pf6qrt4md6fmc8vpn8r0ypn9kh0nx7gzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsygkeaee" />
    <content type="html">
      **Sophos** security advisory 19 December 2024: [Resolved Multiple Vulnerabilities in Sophos Firewall (CVE-2024-12727, CVE-2024-12728, CVE-2024-12729)](&lt;a href=&#34;https://www.sophos.com/en-us/security-advisories/sophos-sa-20241219-sfos-rce&#34;&gt;https://www.sophos.com/en-us/security-advisories/sophos-sa-20241219-sfos-rce&lt;/a&gt; )&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://cve.org/CVERecord?id=CVE-2024-12727&amp;#34&#34;&gt;https://cve.org/CVERecord?id=CVE-2024-12727&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;CVE-2024-12727&amp;lt;/a&amp;gt; (&amp;lt;strong&amp;gt;9.8 critical&amp;lt;/strong&amp;gt;) pre-auth SQL injection vulnerability in the email protection feature of Sophos Firewall&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2024-12728&amp;#34&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2024-12728&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;CVE-2024-12728&amp;lt;/a&amp;gt; (&amp;lt;strong&amp;gt;9.8 critical&amp;lt;/strong&amp;gt;) weak credentials vulnerability potentially allows privileged system access via SSH to Sophos Firewall&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2024-12729&amp;#34&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2024-12729&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34;&amp;gt;CVE-2024-12729&amp;lt;/a&amp;gt; (8.8 high) post-auth code injection vulnerability in the User Portal allows authenticated users to execute code remotely in Sophos Firewall&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;&amp;gt; Sophos has not observed these vulnerabilities to be exploited at this time.&lt;br/&gt;&lt;br/&gt;#sophos #firewall #vulnerability #cve #infosec #cybersecurity
    </content>
    <updated>2024-12-20T16:02:58Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8u6r0jhmymffd6jsthklqr8m9asmhhhc4spgnwq54fnl559nahlqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsys9ljk8</id>
    
      <title type="html">thank you for emphasizing this. Unrelated: You have a robust toot ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8u6r0jhmymffd6jsthklqr8m9asmhhhc4spgnwq54fnl559nahlqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsys9ljk8" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspjxe09y0xcaef3allles9skkvuq4rgahmkanv696wft66hcv8f8qecdck7&#39;&gt;nevent1q…dck7&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;thank you for emphasizing this.&lt;br/&gt;&lt;br/&gt;Unrelated: You have a robust toot history which enables you to keep a running conversation linked to the earliest rumors of an issue/vulnerability. What&amp;#39;s your secret?
    </content>
    <updated>2024-12-20T12:34:18Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstjrrcrmsunec75zg209m4nwprmzazztx5nd8rv33ck5hz58v3dsczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy3ul0k7</id>
    
      <title type="html">**Juniper**: [2024-12 Reference Advisory: Session Smart Router: ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstjrrcrmsunec75zg209m4nwprmzazztx5nd8rv33ck5hz58v3dsczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy3ul0k7" />
    <content type="html">
      **Juniper**: [2024-12 Reference Advisory: Session Smart Router: Mirai malware found on systems when the default password remains unchanged](&lt;a href=&#34;https://supportportal.juniper.net/s/article/2024-12-Reference-Advisory-Session-Smart-Router-Mirai-malware-found-on-systems-when-the-default-password-remains-unchanged?language=en_US&#34;&gt;https://supportportal.juniper.net/s/article/2024-12-Reference-Advisory-Session-Smart-Router-Mirai-malware-found-on-systems-when-the-default-password-remains-unchanged?language=en_US&lt;/a&gt; )&lt;br/&gt;Juniper warns that customers with Juniper Session Smart Routers (SSR) are getting infected with Mirai DDoS botnet malware because they didn&amp;#39;t change from the default password. 🤦‍♂️&lt;br/&gt;&lt;br/&gt;#juniper #threatintel #cybersecurity #infosec #mirai #botnet #securitybestpractice
    </content>
    <updated>2024-12-19T12:44:10Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0a37snlcyu64d6uh66plj3x4u02yffdcr993yvg0htdxmfle4u6qzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyu3h8k9</id>
    
      <title type="html">CVE-2023-34990 is credited to ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0a37snlcyu64d6uh66plj3x4u02yffdcr993yvg0htdxmfle4u6qzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyu3h8k9" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs8nem24ug54avcy523j8tluvv2dgw2swy0hd3977w3f9vu9fadxdqtvlrm4&#39;&gt;nevent1q…lrm4&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;CVE-2023-34990 is credited to [@hacks_zach](&lt;a href=&#34;https://infosec.exchange/@hacks_zach&#34;&gt;https://infosec.exchange/@hacks_zach&lt;/a&gt; ) of Horizon3.ai. This gave me a starting point for figuring out where to look for information. It&amp;#39;s contained in [Fortinet FortiWLM Deep-Dive, IOCs, and the Almost Story of the “Forti Forty”](&lt;a href=&#34;https://www.horizon3.ai/attack-research/disclosures/fortiwlm-the-almost-story-for-the-forti-forty&#34;&gt;https://www.horizon3.ai/attack-research/disclosures/fortiwlm-the-almost-story-for-the-forti-forty&lt;/a&gt; ) posted on 14 March 2024.&lt;br/&gt;&lt;br/&gt;It was described as an unpatched vulnerability: &amp;#34;Unauthenticated Limited Log File Read – Allows retrieval of arbitrary log files which contain administrator session ID tokens&amp;#34; Check out the Path to Remote Code Execution #2 section for vulnerability details:&lt;br/&gt;&lt;br/&gt;&amp;gt; This vulnerability allows remote, unauthenticated attackers to access and abuse builtin functionality meant to read specific log files on the system via a crafted request to the /ems/cgi-bin/ezrf_lighttpd.cgi endpoint. This issue results from the lack of input validation on request parameters allowing an attacker to traverse directories and read any log file on the system.&lt;br/&gt;&lt;br/&gt;Based on the details of the blog, I can confidently say that the new CVE and the blog&amp;#39;s description of the vulnerability are almost certainly one and the same. Timeline puts the reporting at 585 days ago. &lt;br/&gt;&lt;br/&gt;#CVE_2023_34990 #fortinet #fortiwlm #vulnerability #CVE #infosec #cybersecurity
    </content>
    <updated>2024-12-18T18:20:30Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswqhxyqlyr09mugmh503mv5n74jpx3zawaxlyyzwvvgvn82f7raqszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyv8wwh7</id>
    
      <title type="html">I found it. I found the vulnerability details: ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswqhxyqlyr09mugmh503mv5n74jpx3zawaxlyyzwvvgvn82f7raqszyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyv8wwh7" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsdy796msm7jyvrdetn5f4294sycgsa2f5dhp9lsdurqgyh7cts57gm2xzff&#39;&gt;nevent1q…xzff&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I found it. I found the vulnerability details: &lt;a href=&#34;https://www.horizon3.ai/attack-research/disclosures/fortiwlm-the-almost-story-for-the-forti-forty&#34;&gt;https://www.horizon3.ai/attack-research/disclosures/fortiwlm-the-almost-story-for-the-forti-forty&lt;/a&gt;&lt;br/&gt;Unauthenticated Limited Log File Read – Allows retrieval of arbitrary log files which contain administrator session ID tokens&lt;br/&gt;&lt;br/&gt;&amp;#34;CVE-2024-???? (0-day): Fortinet FortiWLM Unauthenticated Limited File Read Vulnerability&amp;#34;&lt;br/&gt;&lt;br/&gt;&amp;gt; This vulnerability allows remote, unauthenticated attackers to access and abuse builtin functionality meant to read specific log files on the system via a crafted request to the /ems/cgi-bin/ezrf_lighttpd.cgi endpoint. This issue results from the lack of input validation on request parameters allowing an attacker to traverse directories and read any log file on the system.
    </content>
    <updated>2024-12-18T18:13:40Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz7vmhhu7ce2claynf7wdk0g5j3ln7wygq68wl85u7d26dhcea6tgzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy5utdml</id>
    
      <title type="html">thank you for this website! I&amp;#39;ve been meaning to see how ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz7vmhhu7ce2claynf7wdk0g5j3ln7wygq68wl85u7d26dhcea6tgzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy5utdml" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswum76r99gycjd9lwdv9dfq5hu6n7hegnre4dh8cqha70swl88uxsgnlhyg&#39;&gt;nevent1q…lhyg&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;thank you for this website! I&amp;#39;ve been meaning to see how others track social media posts besides Feedly: &lt;a href=&#34;https://feedly.com/cve/CVE-2023-34990&#34;&gt;https://feedly.com/cve/CVE-2023-34990&lt;/a&gt;
    </content>
    <updated>2024-12-18T17:08:53Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswjdye4l3684ypklsxsg2eucn5tx4pduahavxypaus0lfhn9dqm9qzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsytvyscv</id>
    
      <title type="html">Here are sources for your Fortinet CVE-2024-34990 (CVSSv3.1: ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswjdye4l3684ypklsxsg2eucn5tx4pduahavxypaus0lfhn9dqm9qzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsytvyscv" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsfr0w3qh6fflxtlpp5szq2yjmhyhwr8lyuxnef8juxaytxxwlev4g2fl6v0&#39;&gt;nevent1q…l6v0&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Here are sources for your Fortinet CVE-2024-34990 (CVSSv3.1: **9.8 critical**): &amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.fortiguard.com/psirt/FG-IR-23-144&amp;#34&#34;&gt;https://www.fortiguard.com/psirt/FG-IR-23-144&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34; translate=&amp;#34;no&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;invisible&amp;#34;&amp;gt;&lt;a href=&#34;https://www.&amp;lt;/span&amp;gt;&amp;lt;span&#34;&gt;https://www.&amp;lt;/span&amp;gt;&amp;lt;span&lt;/a&gt; class=&amp;#34;ellipsis&amp;#34;&amp;gt;fortiguard.com/psirt/FG-IR-23-&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;invisible&amp;#34;&amp;gt;144&amp;lt;/span&amp;gt;&amp;lt;/a&amp;gt; (error loading)&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2023-34990&amp;#34&#34;&gt;https://nvd.nist.gov/vuln/detail/CVE-2023-34990&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener noreferrer&amp;#34; translate=&amp;#34;no&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;invisible&amp;#34;&amp;gt;&lt;a href=&#34;https://&amp;lt;/span&amp;gt;&amp;lt;span&#34;&gt;https://&amp;lt;/span&amp;gt;&amp;lt;span&lt;/a&gt; class=&amp;#34;ellipsis&amp;#34;&amp;gt;nvd.nist.gov/vuln/detail/CVE-2&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;invisible&amp;#34;&amp;gt;023-34990&amp;lt;/span&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;&amp;gt; A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests.&lt;br/&gt;&lt;br/&gt;Note: FortiGuard PSIRT has a tendency to only list the temporal CVSS score 9.6 (lower score) to downplay the severity of its original base score.
    </content>
    <updated>2024-12-18T17:03:05Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8nem24ug54avcy523j8tluvv2dgw2swy0hd3977w3f9vu9fadxdqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy3rxtgj</id>
    
      <title type="html">**Fortinet** 18 December 2024 security advisory ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8nem24ug54avcy523j8tluvv2dgw2swy0hd3977w3f9vu9fadxdqzyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsy3rxtgj" />
    <content type="html">
      **Fortinet** 18 December 2024 security advisory [FG-IR-23-144](&lt;a href=&#34;https://www.fortiguard.com/psirt/FG-IR-23-144&#34;&gt;https://www.fortiguard.com/psirt/FG-IR-23-144&lt;/a&gt; ) &lt;br/&gt;[CVE-2023-34990](&lt;a href=&#34;https://cve.org/CVERecord?id=CVE-2023-34990&#34;&gt;https://cve.org/CVERecord?id=CVE-2023-34990&lt;/a&gt; ) (**9.8 critical**) relative path traversal in Fortinet FortiWLM leads to code and command execution: released today, **557 days** after it was reserved by Fortinet on 09 June 2023. Information in advisory doesn&amp;#39;t match what was submitted to NVD. CVSS score is also different than what&amp;#39;s listed (base vs temporal score. Shame on them for waiting a year to patch/announce the vulnerability.&lt;br/&gt;&lt;br/&gt;h/t: &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1s6eewzr2zvz3ppsa6k8j2hadamsug7q4rp068wmz3grtf440xxkqr8n008&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;cR0w :cascadia: :gayint: 🏴‍☠️&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1s6e…n008&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;&lt;br/&gt;&lt;br/&gt;#fortinet #fortwlm #vulnerability #CVE #infosec #cybersecurity
    </content>
    <updated>2024-12-18T16:34:19Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd8yuj3klapefprvtzlhz37dur27exq9emla5a59n9ng6tfay4uuczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyj0s4yq</id>
    
      <title type="html">**WIRED**: [Intel Officials Warned Police That US Cities ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd8yuj3klapefprvtzlhz37dur27exq9emla5a59n9ng6tfay4uuczyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsyj0s4yq" />
    <content type="html">
      **WIRED**: [Intel Officials Warned Police That US Cities Aren&amp;#39;t Ready for Hostile Drones](&lt;a href=&#34;https://www.wired.com/story/intel-officials-police-us-cities-drones-dhs/&#34;&gt;https://www.wired.com/story/intel-officials-police-us-cities-drones-dhs/&lt;/a&gt; ) (possible paywall)&lt;br/&gt;The Department of Homeland Security warned state and local law enforcement agencies in an August 2024 memo that U.S. cities are vulnerable to the rising threat of weaponized drones:&lt;br/&gt;&lt;br/&gt;&amp;gt; The memo states that violent extremists in the US are increasingly searching for ways to modify &amp;#34;off-the-shelf&amp;#34; drones to ferry dangerous payloads, including &amp;#34;explosives, conductive materials, and chemicals,&amp;#34; with major advancements in the area being propelled largely by rampant experimentation on foreign battlefields, including those in Ukraine.&lt;br/&gt;&amp;gt; Currently, only a handful of federal agencies—including DHS and the Departments of Energy, Justice, and Defense—are legally permitted to bring down a drone inside US airspace.&lt;br/&gt;&lt;br/&gt;The drone epidemic in New Jersey puts a spotlight on law enforcement&amp;#39;s ability to counter drones.&lt;br/&gt;&lt;br/&gt;#drone #threat #news #newjersey #dhs #terrorism
    </content>
    <updated>2024-12-17T16:57:15Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgwxcr8w0vqnuh066t8h6d9cpuj2pfx5adeuq5ssxq0q0jkkwnq2szyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsydhmad2</id>
    
      <title type="html">**CCCS** (Canada): [Alert - CVE-2024-53677 - Vulnerability ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgwxcr8w0vqnuh066t8h6d9cpuj2pfx5adeuq5ssxq0q0jkkwnq2szyz4plwfa8wd7ry98ju9fmsyjme5ucstc0yg8vvefpxr4s4smaccsydhmad2" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspzflg7s59j5jgu4wh56v0prq6zzpmxru4gucd6ky282569ggm4esxe9ytl&#39;&gt;nevent1q…9ytl&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;**CCCS** (Canada): [Alert - CVE-2024-53677 - Vulnerability impacting Apache Struts 2](&lt;a href=&#34;https://www.cyber.gc.ca/en/alerts-advisories/cve-2024-53677-vulnerability-impacting-apache-struts-2&#34;&gt;https://www.cyber.gc.ca/en/alerts-advisories/cve-2024-53677-vulnerability-impacting-apache-struts-2&lt;/a&gt; )&lt;br/&gt;I see multiple government organizations emphasize the criticality of [CVE-2024-53677](&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2024-53677&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2024-53677&lt;/a&gt; ) (CVSSv4: **9.5 critical**) affecting both end-of-life and current versions of Apache Struts 2. A malicious actor can exploit this vulnerability to traverse system paths, upload malicious files, and perform remote code execution.&lt;br/&gt;&lt;br/&gt;The Canadian Centre for Cyber Security (CCCS) is aware that a **proof of concept** (POC) exploit is available for this CVE.&lt;br/&gt;&lt;br/&gt;#apache #struts #CVE_2024_53677 #vulnerability #cve #infosec #cybersecurity #proofofconcept #poc
    </content>
    <updated>2024-12-16T22:09:04Z</updated>
  </entry>

</feed>