mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#activeattack

0 Beiträge0 Beteiligte0 Beiträge heute
BeyondMachines :verified:<p>CISA warns of active attacks on Signal clone TeleMessage</p><p>CISA has issued a warning about two actively exploited vulnerabilities in TeleMessage TM SGNL, a Signal clone used by national security staffers and government officials, including a Spring Boot Actuator misconfiguration (CVE-2025-48927) that exposes memory dumps and a local access vulnerability (CVE-2025-48928) enabling password extraction.</p><p>**If you're using TeleMessage TM SGNL, start patching it today, because it's being actively exploited. Alternatively, stop using the software entirely. Switch back to standard Signal or another approved properly encrypted messaging app since TM SGNL has already been breached and continues to be attacked.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/cisa-warns-of-active-attacks-on-signal-clone-telemessage-6-j-0-0-k/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/cisa-warns-of-active-attacks-on-signal-clone-telemessage-6-j-0-0-k/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Citrix releases emergency patches for actively exploited vulnerability in NetScaler Products</p><p>Citrix has patched a critical actively exploited vulnerability (CVE-2025-6543) in NetScaler ADC and Gateway products that security experts suspect enables code execution despite being characterized as denial-of-service. Citrix has also patched two other critical flaws including one compared to the infamous 2023 CitrixBleed vulnerability. Organizations are urged to immediately patch affected systems and terminate all active sessions.</p><p>**This is now important and URGENT. Your Citrix NetScaler ADC or Gateway, exposed on the internet, they are actively attacked and exploited. Also, there seems to be some indisclosed severity in the three latest critical flaws and possibility of a repeat of the CitrixBleed incident from 2023. Immediately update to the latest patched versions (14.1-47.46, 13.1-59.19, or 13.1-37.236-FIPS). After patching, you must also terminate all active ICA and PCoIP sessions to prevent attackers from using stolen session tokens. If you have end-of-life devices, shut them down NOW - they will be hacked.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/citrix-releases-emergency-patches-for-actively-exploited-vulnerability-in-netscaler-products-m-f-5-f-y/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/citrix-releases-emergency-patches-for-actively-exploited-vulnerability-in-netscaler-products-m-f-5-f-y/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>NPM supply chain attack compromises 17 popular React Native packages</p><p>A supply chain attack compromised 17 widely-used GlueStack NPM packages under @react-native-aria between June 6-7, 2025, affecting packages with over a million weekly downloads by injecting heavily obfuscated remote access trojan (RAT) malware through compromised automation tokens lacking two-factor authentication.</p><p>**If you're using any GlueStack @react-native-aria packages, check your package.json files and update to the latest safe versions. Then scan your systems for signs of compromise and review firewall logs for any suspicious outbound connections to unknown command-and-control servers. If you are a code publisher, make sure all your NPM publishing tokens are secure and have MFA enforced.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/npm-supply-chain-attack-compromises-17-popular-react-native-packages-d-0-p-1-w/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/npm-supply-chain-attack-compromises-17-popular-react-native-packages-d-0-p-1-w/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Critical Roundcube Webmail vulnerability exploited within days of disclosure</p><p>The critical decade-old Roundcube vulnerability (CVE-2025-49113, CVSS 9.9) is now being actively exploited and dubbed "email armageddon". Cybercriminals are selling working exploits on underground forums just 48 hours after patches were released. The vulnerability affects an estimated 53 million hosts globally including major hosting providers like GoDaddy and Hostinger.</p><p>**If you still didn't patch your Roundcube webmail installations, DO IT NOW! The critical flaw is already weaponized and attacks have started. And with leaked passwords, be certain that you will be hacked.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/critical-roundcube-webmail-vulnerability-exploited-within-days-of-disclosure-5-g-7-8-1/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-roundcube-webmail-vulnerability-exploited-within-days-of-disclosure-5-g-7-8-1/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Critical Fortinet vulnerability actively exploited</p><p>Fortinet has patched a critical zero-day vulnerability (CVE-2025-32756, CVSS 9.6) that allows unauthenticated remote code execution and is being actively exploited against FortiVoice systems. The attackers are abusing it to deploy backdoors, capture credentials, and erase logs. The flaw affects multiple products including FortiMail, FortiNDR, FortiRecorder, and FortiCamera.</p><p>**If you are using Fortinet, patch all affected Fortinet products because there is an actively exploited flaw. As a mitigation measure make sure the HTTP/HTTPS is isolated from the internet or even disable it.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/critical-fortinet-vulnerability-actively-exploited-z-e-f-d-s/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/critical-fortinet-vulnerability-actively-exploited-z-e-f-d-s/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Ivanti reports actively exploited EPMM flaws, urges immediate patching</p><p>Ivanti has issued an urgent security advisory warning that attackers are actively chaining two vulnerabilities (CVE-2025-4427 and CVE-2025-4428) in Endpoint Manager Mobile's on-premises deployments to gain unauthorized access and execute malicious code. Some customers have already been compromised, urgent patching is advised.</p><p>**If you are using Ivanti Endpoint Manager Mobile on premises, this is an URGENT advisory. Update your EPMM because it's already actively hacked, using flaws that are not even deemed critical. Just another reminder to always keep up with patches.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/ivanti-reports-actively-exploited-epmm-flaws-urges-immediate-patching-4-y-1-3-y/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/ivanti-reports-actively-exploited-epmm-flaws-urges-immediate-patching-4-y-1-3-y/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>"Bring Your Own Installer" EDR bypass technique exploited on SentinelOne</p><p>The "Bring Your Own Installer" (BYOI) attack technique discovered by Aon's Stroz Friedberg exploits a vulnerability in SentinelOne's upgrade/downgrade process, allowing threat actors with local administrative access to bypass the EDR's anti-tamper protection by terminating the installation process during a 55-second window when no SentinelOne processes are active.</p><p>**If you are using SentinelOne EDR, enabel and enforce "Online authorization" feature immediately in the Sentinels Policy to prevent the "Bring Your Own Installer" attack.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/bring-your-own-installer-new-b-ransomware-b-attack-on-sentinelone-the420-in-o-e-t-k-g/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/bring-your-own-installer-new-b-ransomware-b-attack-on-sentinelone-the420-in-o-e-t-k-g/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Supply chain attack compromises Magento E-commerce extensions</p><p>A coordinated supply chain attack targeting multiple Magento extension vendors has compromised between 500 and 1,000 e-commerce stores worldwide. Backdoors were discovered in 21 different extensions from three primary vendors (Tigren, Meetanshi, and MGS). The backdoors were initially injected as far back as 2019 remained dormant until being activated in April 2025.</p><p>**If you're using Magento e-commerce and have extensions from Tigren, Meetanshi, MGS, or Weltpixel, immediately review the servers for backdoors in License.php or LicenseApi.php files and remove them. Investigate the depth of breach and any customers of data compromised and restore from clean backups. You may have customers compromised as well.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/supply-chain-attack-compromises-magento-e-commerce-extensions-6-1-j-i-j/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/supply-chain-attack-compromises-magento-e-commerce-extensions-6-1-j-i-j/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Microsoft NTLM hash disclosure vulnerability now actively exploited <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/microsoft-ntlm-hash-disclosure-vulnerability-now-actively-exploited-g-9-3-z-7/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/microsoft-ntlm-hash-disclosure-vulnerability-now-actively-exploited-g-9-3-z-7/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Supply-Chain attack compromises popular GitHub Action used by Over 23,000 organizations <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/supply-chain-attack-compromises-popular-github-action-used-by-over-23000-organizations-u-m-v-0-l/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/supply-chain-attack-compromises-popular-github-action-used-by-over-23000-organizations-u-m-v-0-l/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Phishing campaign targeting developers via GitHub uses OAuth app to hijack accounts <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/phishing-campaign-targeting-developers-via-github-uses-oauth-app-to-hijack-accounts-u-4-a-f-w/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/phishing-campaign-targeting-developers-via-github-uses-oauth-app-to-hijack-accounts-u-4-a-f-w/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Active exploitation reported of Hitachi Vantara Pentaho BA Server flaws <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/active-exploitation-reported-of-hitachi-vantara-pentaho-ba-server-flaws-7-j-e-k-m/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/active-exploitation-reported-of-hitachi-vantara-pentaho-ba-server-flaws-7-j-e-k-m/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Spam campaign via XSS vulnerability in Krpano Virtual Tour Framework <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/spam-campaign-via-xss-vulnerability-in-krpano-virtual-tour-framework-2-a-a-p-t/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/spam-campaign-via-xss-vulnerability-in-krpano-virtual-tour-framework-2-a-a-p-t/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Researchers detect hackers exploiting flaw in Cisco Small Business Routers to create botnet <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/researchers-detect-hackers-exploiting-flaw-in-cisco-small-business-routers-to-create-botnet-u-8-j-i-0/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/researchers-detect-hackers-exploiting-flaw-in-cisco-small-business-routers-to-create-botnet-u-8-j-i-0/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>CISA reports active exploitation of Microsoft Partner Center Flaw <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/cisa-reports-active-exploitation-of-microsoft-partner-center-flaw-4-h-r-v-p/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/cisa-reports-active-exploitation-of-microsoft-partner-center-flaw-4-h-r-v-p/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>CISA reports actively exploited flaw in Craft CMS <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/cisa-reports-actively-exploited-flaw-in-craft-cms-q-4-x-d-6/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/cisa-reports-actively-exploited-flaw-in-craft-cms-q-4-x-d-6/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Palo Alto Networks reports another actively exploited firewall bug <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/palo-alto-networks-reports-another-actively-exploited-firewall-bug-c-o-d-g-r/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/palo-alto-networks-reports-another-actively-exploited-firewall-bug-c-o-d-g-r/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Palo Alto confirms PAN-OS vulnerability CVE-2025-0108 actively exploited <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/palo-alto-confirms-pan-os-vulnerability-cve-2025-0108-actively-exploited-5-y-g-h-c/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/palo-alto-confirms-pan-os-vulnerability-cve-2025-0108-actively-exploited-5-y-g-h-c/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Researchers report active attacks on SonicWall SSLVPN flaw, patch now <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/researchers-report-active-attacks-on-sonicwall-sslvpn-flaw-patch-now-k-8-2-s-b/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/researchers-report-active-attacks-on-sonicwall-sslvpn-flaw-patch-now-k-8-2-s-b/gD2P6Ple2L</span></a></p>
BeyondMachines :verified:<p>Increased active exploitation of years-old ThinkPHP, ownCloud flaws <br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attack</span></a> <a href="https://infosec.exchange/tags/activeattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activeattack</span></a><br><a href="https://beyondmachines.net/event_details/increased-active-exploitation-of-years-old-thinkphp-owncloud-flaws-2-3-h-n-f/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/increased-active-exploitation-of-years-old-thinkphp-owncloud-flaws-2-3-h-n-f/gD2P6Ple2L</span></a></p>