digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

828
active users

#rce

9 posts9 participants0 posts today
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/SolarWinds" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SolarWinds</span></a> releases third patch to fix <a href="https://mastodon.thenewoil.org/tags/WebHelpDesk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebHelpDesk</span></a> <a href="https://mastodon.thenewoil.org/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> bug</p><p><a href="https://www.bleepingcomputer.com/news/security/solarwinds-releases-third-patch-to-fix-web-help-desk-rce-bug/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/solarwinds-releases-third-patch-to-fix-web-help-desk-rce-bug/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/HelpDesk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HelpDesk</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Pyrzout :vm:<p>Cisco Confirms Critical CVE-2025-20352 Zero-Day RCE Vulnerability Under Active Exploitation <a href="https://thecyberexpress.com/cisco-ios-rce-vulnerability-cve-2025-20352/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/cisco-ios-</span><span class="invisible">rce-vulnerability-cve-2025-20352/</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpressNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpressNews</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/TheCyberExpress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheCyberExpress</span></a> <a href="https://social.skynetcloud.site/tags/FirewallDaily" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FirewallDaily</span></a> <a href="https://social.skynetcloud.site/tags/CVE202520352" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202520352</span></a> <a href="https://social.skynetcloud.site/tags/CyberNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberNews</span></a> <a href="https://social.skynetcloud.site/tags/CiscoIOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CiscoIOS</span></a> <a href="https://social.skynetcloud.site/tags/IOSXE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IOSXE</span></a> <a href="https://social.skynetcloud.site/tags/PSIRT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PSIRT</span></a> <a href="https://social.skynetcloud.site/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a></p>
Milos Constantin<p>Cisco Warns of Actively Exploited SNMP Vulnerability Allowing <a href="https://hachyderm.io/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> or <a href="https://hachyderm.io/tags/DoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoS</span></a> in <a href="https://hachyderm.io/tags/IOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IOS</span></a> Software <a href="https://thehackernews.com/2025/09/cisco-warns-of-actively-exploited-snmp.html?m=1" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/cisc</span><span class="invisible">o-warns-of-actively-exploited-snmp.html?m=1</span></a></p>
Constantin Milos<p>Cisco Warns of Actively Exploited SNMP Vulnerability Allowing <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> or <a href="https://infosec.exchange/tags/DoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoS</span></a> in <a href="https://infosec.exchange/tags/IOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IOS</span></a> Software <a href="https://thehackernews.com/2025/09/cisco-warns-of-actively-exploited-snmp.html?m=1" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/cisc</span><span class="invisible">o-warns-of-actively-exploited-snmp.html?m=1</span></a></p>
Pyrzout :vm:<p>Major Chinese Cloud Provider Breached, Root Access For Sale <a href="https://dailydarkweb.net/major-chinese-cloud-provider-breached-root-access-for-sale/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dailydarkweb.net/major-chinese</span><span class="invisible">-cloud-provider-breached-root-access-for-sale/</span></a> <a href="https://social.skynetcloud.site/tags/UnauthorizedAccesses" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnauthorizedAccesses</span></a> <a href="https://social.skynetcloud.site/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://social.skynetcloud.site/tags/CloudProvider" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudProvider</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.skynetcloud.site/tags/NetworkBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkBreach</span></a> <a href="https://social.skynetcloud.site/tags/accesssale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>accesssale</span></a> <a href="https://social.skynetcloud.site/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://social.skynetcloud.site/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> <a href="https://social.skynetcloud.site/tags/Asia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Asia</span></a> <a href="https://social.skynetcloud.site/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://social.skynetcloud.site/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a></p>
N-gated Hacker News<p>Veria Labs has discovered that MCP's authentication is about as secure as a wet paper towel, leading to <a href="https://mastodon.social/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> in Claude Code and Gemini CLI 🤦‍♂️💻. The article is a rollercoaster of jargon trying to sound important while basically saying, "Oops, we broke everything!" 🤷‍♀️🔧. Meanwhile, the rest of the industry is scrambling like headless chickens to patch this mess 🐔🔥.<br><a href="https://verialabs.com/blog/from-mcp-to-shell/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">verialabs.com/blog/from-mcp-to</span><span class="invisible">-shell/</span></a> <a href="https://mastodon.social/tags/VeriaLabs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VeriaLabs</span></a> <a href="https://mastodon.social/tags/MCP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MCP</span></a> <a href="https://mastodon.social/tags/securityFail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityFail</span></a> <a href="https://mastodon.social/tags/patchingCrisis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>patchingCrisis</span></a> <a href="https://mastodon.social/tags/techNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>techNews</span></a> <a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ngated" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ngated</span></a></p>
Hacker News<p>From MCP to shell: MCP auth flaws enable RCE in Claude Code, Gemini CLI and more</p><p><a href="https://verialabs.com/blog/from-mcp-to-shell/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">verialabs.com/blog/from-mcp-to</span><span class="invisible">-shell/</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/MCPauth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MCPauth</span></a> <a href="https://mastodon.social/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/flaws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>flaws</span></a> <a href="https://mastodon.social/tags/GeminiCLI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GeminiCLI</span></a> <a href="https://mastodon.social/tags/ClaudeCode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClaudeCode</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Offensive Sequence<p>🚨 CRITICAL: CVE-2025-10147 in Podlove Podcast Publisher (WordPress) enables unauth file uploads—possible RCE. Disable plugin, monitor for suspicious files, use WAFs. Await patch. Details: <a href="https://radar.offseq.com/threat/cve-2025-10147-cwe-434-unrestricted-upload-of-file-49fe7271" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">radar.offseq.com/threat/cve-20</span><span class="invisible">25-10147-cwe-434-unrestricted-upload-of-file-49fe7271</span></a> <a href="https://infosec.exchange/tags/OffSeq" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffSeq</span></a> <a href="https://infosec.exchange/tags/WordPress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WordPress</span></a> <a href="https://infosec.exchange/tags/Vuln" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vuln</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a></p>
Ben ☀️shine<p>Bei der Hälfte von «RCE, <a href="https://ohai.social/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a>» angekommen. Man bekommt schlechte Laune. Warum? Das Buch ist realistischer und nahbarer und leider «schlecht gealtert»(z.b. Spotify) Damit meine ich, das viele Themen - die Sibylle Berg treffend, wunderbar und bissig beschreibt, sich in diese Richtung weiterentwickelt. Danke für dieses Buch, es fesselt mich. Ich will nicht aufhören zu lesen. Aufklärerische Dystopie <span class="h-card" translate="no"><a href="https://digitalcourage.social/@SibylleBerg" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SibylleBerg</span></a></span> <br><a href="https://ohai.social/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://ohai.social/tags/buchtipp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>buchtipp</span></a> <a href="https://ohai.social/tags/b%C3%BCcher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bücher</span></a> <a href="https://ohai.social/tags/Netzpolitik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netzpolitik</span></a></p>
Offensive Sequence<p>🚨 CVE-2025-10155 (CRITICAL, CVSS 9.3) in mmaitre314 picklescan ≤0.0.30: Improper input validation lets attackers bypass pickle file security via PyTorch extensions, enabling remote code execution. Stop using vulnerable versions now! <a href="https://radar.offseq.com/threat/cve-2025-10155-cwe-20-improper-input-validation-in-aa0633e3" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">radar.offseq.com/threat/cve-20</span><span class="invisible">25-10155-cwe-20-improper-input-validation-in-aa0633e3</span></a> <a href="https://infosec.exchange/tags/OffSeq" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffSeq</span></a> <a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a></p>
De Archeoloog<p>Een <a href="https://mastodon.social/tags/oerbos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oerbos</span></a> dat bloot kwam te liggen bij graafwerkzaamheden voor een nieuw meer bij het Friese <a href="https://mastodon.social/tags/Oudega" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Oudega</span></a> blijkt tussen de 4000 en 6000 jaar oud te zijn. Zo blijkt uit onderzoek van de Rijksdienst voor Cultureel Erfgoed (<a href="https://mastodon.social/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a>). De RCE greep deze kans, omdat grootschalige veenafgravingen waarbij vaak ook resten van bomen omhoog komen, steeds minder voorkomen in Nederland.<br><a href="https://www.omropfryslan.nl/nl/nieuws/17781767/oerbos-van-6000-jaar-oud-komt-tevoorschijn-bij-graafwerk" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">omropfryslan.nl/nl/nieuws/1778</span><span class="invisible">1767/oerbos-van-6000-jaar-oud-komt-tevoorschijn-bij-graafwerk</span></a></p>
SOC Goulash<p>Alright team, it's been a pretty packed 24 hours in the cyber world! We've got some critical zero-days under active exploitation, a surge in ransomware activity, new malware discoveries, and some interesting discussions around government cyber initiatives and data privacy. Let's dive in:</p><p>Ransomware Surges &amp; Government Data Leaks 🚨</p><p>- Akira ransomware is actively exploiting a year-old vulnerability (CVE-2024-40766) in SonicWall SSL VPNs, with a significant number of attacks observed since July, often due to unpatched or misconfigured devices where local passwords weren't reset after upgrades.<br>- Vietnam's National Credit Information Center (CIC) was breached by Scattered Spider and Shiny Hunters, leading to the theft and sale of 160 million records including credit card history and government IDs, while Panama's Ministry of Economy and Finance was hit by INC ransomware, claiming 1.5 TB of data.<br>- Aleksanteri Kivimäki, convicted of extorting 20,000 Vastaamo psychotherapy patients, has been released on appeal, highlighting the ongoing legal complexities and victim suffering in this significant data privacy case.<br>- In a less critical but still impactful incident, over a thousand University of Amsterdam students are without working laundry facilities after an attacker jailbroke smart machines to allow free washes, with the management company refusing to cover costs.</p><p>🤫 CyberScoop | <a href="https://cyberscoop.com/sonicwall-akira-ransomware-attacks-surge/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/sonicwall-akira</span><span class="invisible">-ransomware-attacks-surge/</span></a><br>🗞️ The Record | <a href="https://therecord.media/vietnam-cic-panama-finance-ministry-cyberattacks" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/vietnam-cic-pa</span><span class="invisible">nama-finance-ministry-cyberattacks</span></a><br>🗞️ The Record | <a href="https://therecord.media/finland-vastaamo-hacker-free-during-appeal-conviction" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/finland-vastaa</span><span class="invisible">mo-hacker-free-during-appeal-conviction</span></a><br>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/12/jailbroken_laundry_machines/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/12/jailbroken_laundry_machines/</span></a></p><p>Zero-Days &amp; RCEs Under Active Exploitation 🛡️</p><p>- Samsung has patched CVE-2025-21043, a critical out-of-bounds write zero-day in its libimagecodec.quram.so library, actively exploited on Android 13+ devices and reported by Meta/WhatsApp, allowing remote code execution.<br>- CISA has added CVE-2025-5086, a critical deserialization RCE flaw in Dassault Systèmes' DELMIA Apriso, to its KEV catalog due to active exploitation, with observed attacks involving malicious SOAP requests executing .NET executables.<br>- The Cursor AI code editor has a security weakness where Workspace Trust is disabled by default, allowing silent code execution via malicious .vscode/tasks.json files when a project is opened, posing a significant supply chain risk.<br>- Apple has issued its fourth spyware alert this year to French users, indicating highly-targeted attacks, following a recent WhatsApp zero-click flaw (CVE-2025-55177) chained with an Apple iOS bug (CVE-2025-43300) in advanced spyware campaigns.</p><p>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/samsung-patches-actively-exploited-zero-day-reported-by-whatsapp/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/samsung-patches-actively-exploited-zero-day-reported-by-whatsapp/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/samsung-fixes-critical-zero-day-cve.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/sams</span><span class="invisible">ung-fixes-critical-zero-day-cve.html</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/cursor-ai-code-editor-flaw-enables-silent-code-execution-via-malicious-repositories.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/curs</span><span class="invisible">or-ai-code-editor-flaw-enables-silent-code-execution-via-malicious-repositories.html</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-actively-exploited-dassault-rce-vulnerability/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisa-warns-of-actively-exploited-dassault-rce-vulnerability/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/apple-warns-french-users-of-fourth-spyware-campaign-in-2025-cert-fr-confirms.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/appl</span><span class="invisible">e-warns-french-users-of-fourth-spyware-campaign-in-2025-cert-fr-confirms.html</span></a></p><p>New Malware &amp; Attacker Tradecraft Insights 🕵️‍♀️</p><p>- Huntress gained unique insights into an attacker's tradecraft after they mistakenly installed a trial EDR, revealing their use of automation, AI, phishing kits, and Google Translate for targeting, sparking an ethical debate within the infosec community.<br>- A new ransomware strain, HybridPetya, has been discovered, capable of bypassing UEFI Secure Boot by exploiting CVE-2024-7344 to install a malicious bootkit on the EFI System Partition, mimicking Petya/NotPetya's destructive style.<br>- Bitdefender uncovered EggStreme, a novel multi-stage, fileless malware framework attributed to a China-linked APT, used in an espionage campaign against a Philippine military company for over a year, demonstrating advanced evasion techniques.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/12/huntress_attacker_surveillance/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/12/huntress_attacker_surveillance/</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/new-hybridpetya-ransomware-can-bypass-uefi-secure-boot/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-hybridpetya-ransomware-can-bypass-uefi-secure-boot/</span></a><br>🗞️ The Record | <a href="https://therecord.media/philippines-military-company-suspected-china-espionage-eggstreme-malware" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/philippines-mi</span><span class="invisible">litary-company-suspected-china-espionage-eggstreme-malware</span></a></p><p>Insider Threat in Schools 🏫</p><p>- The UK's Information Commissioner's Office (ICO) reports that over half of school cyberattacks are caused by students, with nearly a third stemming from stolen login details, often due to poor staff practices.<br>- The ICO and National Crime Agency (NCA) are urging parents to intervene early if they suspect children are engaging in cybercrime, as seemingly minor acts can escalate into serious offenses targeting critical infrastructure.<br>- Real-world cases include Year 11 students breaking into school IMS systems and college students manipulating data, highlighting the need for better GDPR training for staff and removing temptation for students.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/12/students_school_cyberattacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/12/students_school_cyberattacks/</span></a></p><p>Digital ID &amp; Surveillance Concerns 🔒</p><p>- Big Brother Watch warns that a national digital ID in the UK, proposed to tackle illegal immigration, risks creating a "checkpoint society" and enabling mass surveillance, with 63% of Brits distrusting the government with their data.<br>- The civil liberties group argues the government's rationale is poorly substantiated and that the plan's scope could easily expand beyond initial checks to cover everyday activities like banking or GP appointments.<br>- Concerns are also raised about the existing One Login system's cybersecurity weaknesses and the potential for "voluntary" enrolment to become mandatory, excluding individuals from essential services due to errors or refusal.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/12/privacy_activists_warn_uk_digital_id_risks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/12/privacy_activists_warn_uk_digital_id_risks/</span></a></p><p>CISA's Funding &amp; Talent Challenges 🏛️</p><p>- Despite significant personnel and funding cuts proposed by the Trump administration, CISA's new Executive Assistant Director of Cybersecurity, Nick Andersen, asserts the agency's operational capabilities remain strong and focused on core missions.<br>- Andersen also urged Congress to renew the 2015 Cybersecurity Information Sharing Act (CISA 2015) before its September 30th expiry, emphasising its importance for voluntary threat intelligence sharing with the federal government.<br>- However, a DHS Inspector General report found CISA mismanaged its Cyber Incentive program, wasting over $138 million by paying ineligible employees and failing to track recipients, risking attrition of critical cyber talent.</p><p>🤫 CyberScoop | <a href="https://cyberscoop.com/cisa-operational-strength-despite-cuts-nicholas-andersen-billington-cybersecurity-summit/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/cisa-operationa</span><span class="invisible">l-strength-despite-cuts-nicholas-andersen-billington-cybersecurity-summit/</span></a><br>🗞️ The Record | <a href="https://therecord.media/cisa-official-calls-on-lawmakers-renew-cisa2015" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/cisa-official-</span><span class="invisible">calls-on-lawmakers-renew-cisa2015</span></a><br>🤫 CyberScoop | <a href="https://fedscoop.com/cisa-cyber-incentive-program-dhs-inspector-general-report/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fedscoop.com/cisa-cyber-incent</span><span class="invisible">ive-program-dhs-inspector-general-report/</span></a><br>🗞️ The Record | <a href="https://therecord.media/cisa-cybersecurity-retention-incentives-dhs-ig-audit" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/cisa-cybersecu</span><span class="invisible">rity-retention-incentives-dhs-ig-audit</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://social.treehouse.systems/@krutonium" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>krutonium</span></a></span> interesting, so it's a semi-persistent method.</p><p>Still, having <a href="https://infosec.space/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> level access means one can build <span class="h-card" translate="no"><a href="https://infosec.space/@OS1337" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>OS1337</span></a></span> and propably shove that over as root filesystem…</p><p>Problem is rather to have the full hardware specs and potential (non-mainline) drivers loaded</p>
Pyrzout :vm:<p>WinRAR Zero-Day RCE Vulnerability Allegedly for Sale for $65,000 <a href="https://dailydarkweb.net/winrar-zero-day-rce-vulnerability-allegedly-for-sale-for-65000/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dailydarkweb.net/winrar-zero-d</span><span class="invisible">ay-rce-vulnerability-allegedly-for-sale-for-65000/</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.skynetcloud.site/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://social.skynetcloud.site/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> <a href="https://social.skynetcloud.site/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://social.skynetcloud.site/tags/WinRAR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WinRAR</span></a> <a href="https://social.skynetcloud.site/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a></p>
Alexandre Borges<p>CVE-2025-53772 — IIS Web Deploy RCE</p><p><a href="https://hawktrace.com/blog/cve-2025-53772" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hawktrace.com/blog/cve-2025-53</span><span class="invisible">772</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/rce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rce</span></a> <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitation</span></a>&nbsp;<a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a></p>
Offensive Sequence<p>🚨 CVE-2025-58367: DeepDiff &lt;8.6.1 (Python) allows CRITICAL RCE via unsafe Pickle deserialization. Affects 5.0.0–8.6.0. Upgrade now or restrict input to Delta class. Details: <a href="https://radar.offseq.com/threat/cve-2025-58367-cwe-915-improperly-controlled-modif-953e36fd" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">radar.offseq.com/threat/cve-20</span><span class="invisible">25-58367-cwe-915-improperly-controlled-modif-953e36fd</span></a> <a href="https://infosec.exchange/tags/OffSeq" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffSeq</span></a> <a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a></p>
Pyrzout :vm:<p>Critical Android Zero-Day Exploit for Versions 11-15 Allegedly for Sale on Dark Web <a href="https://dailydarkweb.net/critical-android-zero-day-exploit-for-versions-11-15-allegedly-for-sale-on-dark-web/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dailydarkweb.net/critical-andr</span><span class="invisible">oid-zero-day-exploit-for-versions-11-15-allegedly-for-sale-on-dark-web/</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.skynetcloud.site/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/ZeroClick" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroClick</span></a> <a href="https://social.skynetcloud.site/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> <a href="https://social.skynetcloud.site/tags/darkweb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>darkweb</span></a> <a href="https://social.skynetcloud.site/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> <a href="https://social.skynetcloud.site/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://social.skynetcloud.site/tags/0day" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>0day</span></a> <a href="https://social.skynetcloud.site/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a></p>
Sam Stepanyan :verified: 🐘<p><a href="https://infosec.exchange/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a>: Urgent fixes released to address a Critical Remote Code Execution (<a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a>) <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> CVE-2025-7775 which is being actively exploited in attacks along with two other high severity flaws. Patch now!<br><a href="https://infosec.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a><br>👇<br><a href="https://www.bleepingcomputer.com/news/security/citrix-fixes-critical-netscaler-rce-flaw-exploited-in-zero-day-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/citrix-fixes-critical-netscaler-rce-flaw-exploited-in-zero-day-attacks/</span></a></p>
Pyrzout :vm:<p>Elastic Refutes Claims of Zero-Day in EDR Product <a href="https://www.securityweek.com/elastic-refutes-claims-of-zero-day-in-edr-product/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/elastic-refut</span><span class="invisible">es-claims-of-zero-day-in-edr-product/</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/controversy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>controversy</span></a> <a href="https://social.skynetcloud.site/tags/Elastic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Elastic</span></a> <a href="https://social.skynetcloud.site/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://social.skynetcloud.site/tags/EDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDR</span></a> <a href="https://social.skynetcloud.site/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a></p>
Pyrzout :vm:<p>Elastic Refutes Claims of Zero-Day in EDR Product <a href="https://www.securityweek.com/elastic-refutes-claims-of-zero-day-in-edr-product/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/elastic-refut</span><span class="invisible">es-claims-of-zero-day-in-edr-product/</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/controversy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>controversy</span></a> <a href="https://social.skynetcloud.site/tags/Elastic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Elastic</span></a> <a href="https://social.skynetcloud.site/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://social.skynetcloud.site/tags/EDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDR</span></a> <a href="https://social.skynetcloud.site/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a></p>