mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#zeroday

7 Beiträge5 Beteiligte0 Beiträge heute
Daniel Kuhl 📯<p>From Check Point Research:</p><p>Following Microsoft disclosure of a critical SharePoint 0-day vulnerability dubbed “ToolShell” (CVE-2025-53770, a variant of the authentication-bypass bug CVE-2025-49706), Check Point Research released an advisory with key findings on the vulnerability.</p><p><a href="https://blog.checkpoint.com/research/sharepoint-zero-day-cve-2025-53770-actively-exploited-what-security-teams-need-to-know/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.checkpoint.com/research/s</span><span class="invisible">harepoint-zero-day-cve-2025-53770-actively-exploited-what-security-teams-need-to-know/</span></a></p><p><a href="https://infosec.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a> <a href="https://infosec.exchange/tags/toolshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>toolshell</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a></p>
ManiabelChris<p>Nur einige Stichworte zum Thema: Was kann da schon passieren...</p><ul><li><a href="https://mastodon.de/tags/Atomwaffen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Atomwaffen</span></a></li><li><a href="https://mastodon.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.de/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a></li><li><a href="https://mastodon.de/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> </li><li><a href="https://mastodon.de/tags/Breach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Breach</span></a></li></ul><p>Interessant, was Bloomberg berichtet:<br><a href="https://www.bloomberg.com/news/articles/2025-07-23/us-nuclear-weapons-agency-breached-in-microsoft-sharepoint-hack" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bloomberg.com/news/articles/20</span><span class="invisible">25-07-23/us-nuclear-weapons-agency-breached-in-microsoft-sharepoint-hack</span></a></p><p><a href="https://mastodon.de/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Daniel Kuhl 📯<p>ToolShell is actively being exploited and if you're running SharePoint on-prem, this is a real threat!</p><p>Join our <a href="https://infosec.exchange/tags/CheckMates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CheckMates</span></a> session tomorrow, Thursday, July 24 at 4 PM CET | 10 AM EST to learn how the exploit works, who's being targeted, and what you can do right now to protect your environment.</p><p>We'll hear the latest insights from Check Point Research along with actionable steps.</p><p><a href="https://checkpoint.zoom.us/webinar/register/6317532570861/WN_7suWr4NBRFazMtp72zCd3A" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">checkpoint.zoom.us/webinar/reg</span><span class="invisible">ister/6317532570861/WN_7suWr4NBRFazMtp72zCd3A</span></a></p><p><a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/ToolShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ToolShell</span></a> <a href="https://infosec.exchange/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/CheckPoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CheckPoint</span></a> <a href="https://infosec.exchange/tags/CVE202553770" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202553770</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a></p>
Opalsec :verified:<p>Hey everyone! It's been a pretty packed 24 hours in the cyber world, with critical zero-day exploits, major breaches, new malware tactics, and some significant policy shifts from the UK government. Let's dive in:</p><p>SharePoint Zero-Days Under Active Exploitation by China-Linked APTs ⚠️<br>- Microsoft SharePoint on-premise servers are under active attack via a chain of zero-day vulnerabilities (CVE-2025-53770, CVE-2025-53771), allowing unauthenticated Remote Code Execution (RCE) and spoofing.<br>- Microsoft attributes exploitation to China-linked nation-state groups Linen Typhoon (APT27), Violet Typhoon (APT31), and Storm-2603, who are deploying web shells and stealing MachineKeys for persistence.<br>- Emergency patches have been released for SharePoint Server Subscription Edition, 2019, and 2016, but organisations with internet-exposed on-premise servers should assume compromise and rotate ASP.NET machine keys and restart IIS.</p><p>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-toolshell-attacks-linked-to-chinese-hackers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-sharepoint-toolshell-attacks-linked-to-chinese-hackers/</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-critical-sharepoint-2016-zero-days-amid-active-exploits/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-patches-critical-sharepoint-2016-zero-days-amid-active-exploits/</span></a><br>🤫 CyberScoop | <a href="https://cyberscoop.com/microsoft-sharepoint-zero-days-china-typhoon/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/microsoft-share</span><span class="invisible">point-zero-days-china-typhoon/</span></a><br>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/07/22/chinese_groups_attacking_microsoft_sharepoint/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/07/22/chinese_groups_attacking_microsoft_sharepoint/</span></a></p><p>Cisco ISE RCE Flaws Actively Exploited 🛡️<br>- Cisco warns of active exploitation of three maximum-severity (CVSS 10.0) unauthenticated Remote Code Execution (RCE) vulnerabilities in Cisco Identity Services Engine (ISE): CVE-2025-20281, CVE-2025-20282, and CVE-2025-20337.<br>- These flaws allow attackers to execute arbitrary commands as root or upload and execute malicious files without authentication.<br>- Immediate patching to ISE 3.3 Patch 7 or ISE 3.4 Patch 2 is critical, as there are no workarounds.</p><p>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/cisco-maximum-severity-ise-rce-flaws-now-exploited-in-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisco-maximum-severity-ise-rce-flaws-now-exploited-in-attacks/</span></a></p><p>Recent Cyber Attacks and Breaches 🚨<br>- Dell confirmed a breach of its "Solution Center" demo environment, stating that the exfiltrated 1.3 TB of data by WorldLeaks (Hunters International rebrand) was "primarily synthetic (fake) data" or non-sensitive.<br>- Hungarian police arrested a 23-year-old suspect, "Hano," for a prolonged series of DDoS attacks against independent media outlets in Hungary and the Vienna-based International Press Institute (IPI) since April 2023.<br>- AMEOS Group, a major Central European healthcare network, disclosed a security breach where external actors gained unauthorised access to IT systems, potentially exposing patient, employee, and partner data, leading to a full IT system shutdown.<br>- A Silicon Valley engineer, Chenguang Gong, pleaded guilty to stealing thousands of trade secrets, including sensitive US missile technology and radiation-hardened camera designs, from his employers, with links to Chinese "talent programs."</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/07/21/dell_scoffs_at_breach/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/07/21/dell_scoffs_at_breach/</span></a><br>🗞️ The Record | <a href="https://therecord.media/hungary-arrest-suspect-hacking-independent-media" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/hungary-arrest</span><span class="invisible">-suspect-hacking-independent-media</span></a><br>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/07/22/engineer_admits_trade_theft/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/07/22/engineer_admits_trade_theft/</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/major-european-healthcare-network-discloses-security-breach/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/major-european-healthcare-network-discloses-security-breach/</span></a></p><p>New Malware and Ransomware Tactics 👾<br>- CISA and FBI issued a joint warning about escalating Interlock ransomware activity, which targets businesses and critical infrastructure, particularly healthcare, using unusual initial access methods like drive-by downloads from compromised sites and fake browser updates.<br>- Russian cybersecurity researchers disrupted NyashTeam, a Russian-speaking group operating a malware-as-a-service scheme (DCRat, WebRat) since 2022, by dismantling over 110 domains and removing associated Telegram channels and instructional videos.<br>- A new variant of the Coyote banking trojan is abusing Microsoft's UI Automation (UIA) framework to identify banking and cryptocurrency exchange sites, a technique that evades Endpoint Detection and Response (EDR) and marks the first real-world case of UIA abuse for data theft.<br>- Arch Linux removed three malicious packages ("librewolf-fix-bin", "firefox-patch-bin", "zen-browser-patched-bin") from its Arch User Repository (AUR) that were installing the CHAOS Remote Access Trojan (RAT), highlighting the risks of community-maintained repositories.</p><p>🗞️ The Record | <a href="https://therecord.media/russia-hacker-group-disrupted-local-researchers" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/russia-hacker-</span><span class="invisible">group-disrupted-local-researchers</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/cisa-and-fbi-warn-of-escalating-interlock-ransomware-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisa-and-fbi-warn-of-escalating-interlock-ransomware-attacks/</span></a><br>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/07/22/arch_aur_browsers_compromised/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/07/22/arch_aur_browsers_compromised/</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/coyote-malware-abuses-windows-accessibility-framework-for-data-theft/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/coyote-malware-abuses-windows-accessibility-framework-for-data-theft/</span></a><br>🗞️ The Record | <a href="https://therecord.media/fbi-vigilance-interlock-ransomware" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/fbi-vigilance-</span><span class="invisible">interlock-ransomware</span></a></p><p>UK Government's Ransomware Policy Shift 🇬🇧<br>- The UK government is proposing a ban on ransomware payments by public sector organisations and critical national infrastructure (CNI) to disrupt the criminal business model and make these entities less attractive targets.<br>- New measures, part of the Cyber Resilience Bill, will also mandate reporting of all ransomware incidents to law enforcement and require private businesses to notify the government before making any ransom payments.<br>- While aiming to improve visibility and resilience, concerns remain about the effectiveness of a payment ban on opportunistic attackers and whether law enforcement will have sufficient resources to utilise the increased intelligence.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/07/22/uk_to_ban_ransomware_payments/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/07/22/uk_to_ban_ransomware_payments/</span></a><br>🗞️ The Record | <a href="https://therecord.media/mandatory-reporting-ransomware-attacks-uk-proposal" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/mandatory-repo</span><span class="invisible">rting-ransomware-attacks-uk-proposal</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/uk-to-ban-public-sector-orgs-from-paying-ransomware-gangs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/uk-to-ban-public-sector-orgs-from-paying-ransomware-gangs/</span></a><br>🤫 CyberScoop | <a href="https://cyberscoop.com/uk-ransomware-payment-ban-public-sector-private-business-reporting/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/uk-ransomware-p</span><span class="invisible">ayment-ban-public-sector-private-business-reporting/</span></a></p><p>New Wi-Fi Tracking Raises Privacy Concerns 🔒<br>- Researchers in Italy have developed "WhoFi," a technique that creates a unique biometric identifier for individuals based on how their bodies interfere with Wi-Fi signals (Channel State Information - CSI).<br>- This method allows for re-identification and tracking of people across different Wi-Fi networks with high accuracy (up to 95.5%), even if they are not carrying a device.<br>- The research raises significant privacy concerns, as it enables pervasive surveillance without traditional visual or device-based tracking.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/07/22/whofi_wifi_identifier/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/07/22/whofi_wifi_identifier/</span></a></p><p>CISA CyberSentry Program Funding Lapses 📉<br>- Funding for CISA's CyberSentry Program, a critical public-private partnership that monitors US critical infrastructure (IT/OT) for nation-state threats, expired on Sunday.<br>- This lapse has forced Lawrence Livermore National Laboratory to stop monitoring networks, creating a significant gap in visibility into potential cyberattacks on essential services.<br>- The incident highlights ongoing instability and funding challenges within CISA and the broader federal government, impacting vital cybersecurity initiatives.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/07/22/lapsed_cisa_funding_cybersentry/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/07/22/lapsed_cisa_funding_cybersentry/</span></a></p><p>Open Source Security: Eyeballs and Trust 👀<br>- An opinion piece highlights that while open source software benefits from "many eyes" for security, this doesn't come for free; trust is built through clear communication and defensive coding.<br>- Automated scanners can misidentify benign, low-level system utilities as malware, as demonstrated by John Hammond's analysis of the "Talon" Windows de-bloater.<br>- Developers of open source tools that perform system-wide modifications should provide thorough documentation and and comments to clarify their intent and avoid triggering suspicion.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/07/22/open_source_windows_security_opinion_column/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/07/22/open_source_windows_security_opinion_column/</span></a></p><p>Windows Server Update Issues ⚙️<br>- Microsoft has acknowledged a known issue where the July 8th Windows Server 2019 security update (KB5062557) causes the Cluster service to repeatedly stop and restart.<br>- This bug can prevent nodes from rejoining clusters, lead to virtual machine restarts, and trigger Event ID 7031 errors, especially on systems with BitLocker enabled on Cluster Shared Volumes (CSV) drives.<br>- While a mitigation is available, Microsoft has not yet rolled it out publicly and is advising affected organisations to contact business support for assistance.</p><p>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-server-kb5062557-causes-cluster-vm-issues/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-windows-server-kb5062557-causes-cluster-vm-issues/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://infosec.exchange/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://infosec.exchange/tags/CiscoISE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CiscoISE</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/NationState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NationState</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/UKGov" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UKGov</span></a> <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a></p>
nemo™ 🇺🇦<p>🚨 Chinese state hackers launch stealthy attacks exploiting critical Microsoft SharePoint vulnerabilities in on-prem servers, allowing remote code execution &amp; persistent access. 🌐 Microsoft urges urgent patching to prevent data breaches &amp; maintain security. <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mas.to/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://mas.to/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://mas.to/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a> </p><p>🔗 <a href="https://cyberinsider.com/microsoft-chinese-state-hackers-target-sharepoint-flaw-in-stealthy-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberinsider.com/microsoft-chi</span><span class="invisible">nese-state-hackers-target-sharepoint-flaw-in-stealthy-attacks/</span></a></p>
Paul Chambers🚧<p><span class="h-card" translate="no"><a href="https://ioc.exchange/@bluetea" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bluetea</span></a></span> Also, here is the release: </p><p>🔗 Customer guidance for SharePoint vulnerability CVE-2025-53770<br><a href="https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">msrc.microsoft.com/blog/2025/0</span><span class="invisible">7/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/</span></a></p><p><a href="https://archive.ph/Dlhra" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">archive.ph/Dlhra</span><span class="invisible"></span></a> <a href="https://oldfriends.live/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://oldfriends.live/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://oldfriends.live/tags/Hack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hack</span></a> <a href="https://oldfriends.live/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://oldfriends.live/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> </p><p><span class="h-card" translate="no"><a href="https://freeradical.zone/@funnymonkey" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>funnymonkey</span></a></span></p>
CybersecKyle<p>VMware fixes four ESXi zero-day bugs exploited at Pwn2Own Berlin <a href="https://www.bleepingcomputer.com/news/security/vmware-fixes-four-esxi-zero-day-bugs-exploited-at-pwn2own-berlin/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/vmware-fixes-four-esxi-zero-day-bugs-exploited-at-pwn2own-berlin/</span></a></p><p><a href="https://infosec.exchange/tags/vmware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vmware</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a></p>
CybersecKyle<p>CVE-2025-6554 marks the fifth actively exploited Chrome Zero-Day patched by Google in 2025 <a href="https://securityaffairs.com/180001/hacking/cve-2025-6554-marks-the-fifth-actively-exploited-chrome-zero-day-patched-by-google-in-2025.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180001/hac</span><span class="invisible">king/cve-2025-6554-marks-the-fifth-actively-exploited-chrome-zero-day-patched-by-google-in-2025.html</span></a></p><p><a href="https://infosec.exchange/tags/cyberseurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberseurity</span></a> <a href="https://infosec.exchange/tags/chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chrome</span></a> <a href="https://infosec.exchange/tags/Zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zeroday</span></a></p>
nemo™ 🇺🇦<p>Google has released an emergency Chrome update to patch CVE-2025-6558, a high-severity sandbox escape flaw actively exploited in the wild 🚨. The vulnerability affects ANGLE/GPU components and could let attackers break out of Chrome’s security sandbox via a malicious webpage 💻. This impacts all major platforms and Chrome derivatives—update immediately! 🔗 <a href="https://cyberinsider.com/google-patches-actively-exploited-sandbox-escape-flaw-in-chrome/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberinsider.com/google-patche</span><span class="invisible">s-actively-exploited-sandbox-escape-flaw-in-chrome/</span></a> <a href="https://mas.to/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mas.to/tags/UpdateNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UpdateNow</span></a> <a href="https://mas.to/tags/Chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chrome</span></a> <a href="https://mas.to/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
nemo™ 🇺🇦<p>Achtung: Eine kritische Zero-Day-Lücke in Chrome ermöglicht Hackern das Ausbrechen aus der Sandbox! 🚨 Nutzer sollten jetzt sofort updaten, um sich vor Angriffen zu schützen. Mehr Infos dazu im Artikel von golem: <a href="https://www.golem.de/news/google-warnt-zero-day-luecke-in-chrome-laesst-hacker-aus-sandbox-ausbrechen-2507-198152.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/google-warnt-zer</span><span class="invisible">o-day-luecke-in-chrome-laesst-hacker-aus-sandbox-ausbrechen-2507-198152.html</span></a> 🔒 <a href="https://mas.to/tags/Chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chrome</span></a> <a href="https://mas.to/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://mas.to/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mas.to/tags/UpdateJetzt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UpdateJetzt</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p><a href="https://kolektiva.social/tags/Japan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Japan</span></a>-based <a href="https://kolektiva.social/tags/NipponSteel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NipponSteel</span></a> Solutions on Tuesday disclosed a data breach that resulted from the exploitation of a zero-day vulnerability.<br><a href="https://kolektiva.social/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttacks</span></a> <a href="https://kolektiva.social/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <br><a href="https://kolektiva.social/tags/Zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zeroday</span></a> <a href="https://www.securityweek.com/nippon-steel-subsidiary-blames-data-breach-on-zero-day-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/nippon-steel-</span><span class="invisible">subsidiary-blames-data-breach-on-zero-day-attack/</span></a></p>
Mac King :mastodon:<p>Zero Day Staffel 1 ✔️<br><a href="https://toot.berlin/tags/serien" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>serien</span></a> <a href="https://toot.berlin/tags/serienjunkie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>serienjunkie</span></a> <a href="https://toot.berlin/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <br><span class="h-card" translate="no"><a href="https://anonsys.net/profile/filme_serien" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>filme_serien</span></a></span> </p><p><a href="https://www.imdb.com/title/tt23872886/?ref_=ext_shr_other" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">imdb.com/title/tt23872886/?ref</span><span class="invisible">_=ext_shr_other</span></a></p>
nemo™ 🇺🇦<p>🚨 Google patches a critical V8 vulnerability in Chrome that's being actively exploited! Users urged to update ASAP to stay protected. The flaw (CVE-2025-6554) allows attackers to run code via malicious sites. 🔒💻 <a href="https://mas.to/tags/Chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chrome</span></a> <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a> </p><p>Read more: <a href="https://cyberinsider.com/google-patches-actively-exploited-v8-vulnerability-in-chrome/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberinsider.com/google-patche</span><span class="invisible">s-actively-exploited-v8-vulnerability-in-chrome/</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a>-linked group <a href="https://infosec.exchange/tags/Houken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Houken</span></a> hit French organizations using zero-days<br><a href="https://securityaffairs.com/179602/apt/china-linked-group-houken-hit-french-organizations-using-zero-days.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/179602/apt</span><span class="invisible">/china-linked-group-houken-hit-french-organizations-using-zero-days.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a></p>
Anne Sverini ☀️<p>Ich habe mir - zu kaum was anderem wegen der Hitze in der Lage - einige Episoden von <a href="https://troet.cafe/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> angeschaut.<br>Ich mag Robert de Niro. Ein klasse Schauspieler.<br>DIe Episoden lassen mich immer wieder an Darth <a href="https://troet.cafe/tags/Trump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trump</span></a> denken. Auch so ein egomaner und selbstherrlicher Paranoiker - unfähig zur Selbstkritik.<br><a href="https://www.imdb.com/de/title/tt23872886/?ref_=nv_sr_srsg_0_tt_8_nm_0_in_0_q_zero%2520day" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">imdb.com/de/title/tt23872886/?</span><span class="invisible">ref_=nv_sr_srsg_0_tt_8_nm_0_in_0_q_zero%2520day</span></a></p>
Christoph Schmees<p>Zero-Day Sicherheitsloch in Chrome/Chromium wird bereits ausgenutzt</p><p>Überraschung! Google hat es wieder einmal geschafft, in Chrome eine Sicherheitslücke mit hohem Risiko einzubauen. Diese wird bereits für Angriffe ausgenutzt. Da die Lücke in der JavaScript-Maschine V8 steckt, sind auch Chromium und alle darauf aufbauenden Browser (z.B. Opera oder Vivaldi) betroffen.</p><p><a href="https://www.pc-fluesterer.info/wordpress/2025/07/01/zero-day-sicherheitsloch-in-chrome-chromium-wird-bereits-ausgenutzt/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pc-fluesterer.info/wordpress/2</span><span class="invisible">025/07/01/zero-day-sicherheitsloch-in-chrome-chromium-wird-bereits-ausgenutzt/</span></a></p><p><a href="https://social.tchncs.de/tags/Empfehlung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Empfehlung</span></a> <a href="https://social.tchncs.de/tags/Warnung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Warnung</span></a> <a href="https://social.tchncs.de/tags/0day" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>0day</span></a> <a href="https://social.tchncs.de/tags/antisoziale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>antisoziale</span></a> <a href="https://social.tchncs.de/tags/browser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>browser</span></a> <a href="https://social.tchncs.de/tags/chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chrome</span></a> <a href="https://social.tchncs.de/tags/google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>google</span></a> <a href="https://social.tchncs.de/tags/javascript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>javascript</span></a> <a href="https://social.tchncs.de/tags/sicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sicherheit</span></a> <a href="https://social.tchncs.de/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a>: <a href="https://social.tchncs.de/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bluetooth</span></a>-Lücke macht Millionen Kopfhörer zu Abhörstationen | Security <a href="https://www.heise.de/news/Zero-Day-Bluetooth-Luecke-macht-Millionen-Kopfhoerer-zu-Abhoerstationen-10457857.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Zero-Day-Bluetoo</span><span class="invisible">th-Luecke-macht-Millionen-Kopfhoerer-zu-Abhoerstationen-10457857.html</span></a> <a href="https://social.tchncs.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.tchncs.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.tchncs.de/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://social.tchncs.de/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://social.tchncs.de/tags/%C3%9Cberwachung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Überwachung</span></a></p>
Scripter :verified_flashing:<p>Zero-Day: Bluetooth-Lücke macht Millionen Kopfhörer zu Abhörstationen | heise online<br><a href="https://www.heise.de/news/Zero-Day-Bluetooth-Luecke-macht-Millionen-Kopfhoerer-zu-Abhoerstationen-10457857.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Zero-Day-Bluetoo</span><span class="invisible">th-Luecke-macht-Millionen-Kopfhoerer-zu-Abhoerstationen-10457857.html</span></a> <a href="https://social.tchncs.de/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://social.tchncs.de/tags/BluetoothKopfh%C3%B6rer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BluetoothKopfhörer</span></a> <a href="https://social.tchncs.de/tags/Sicherheitsl%C3%BCcke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücke</span></a></p>
CryptGoat<p><a href="https://fedifreu.de/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bluetooth</span></a> was a mistake: Millions of Bluetooth headphones can potentially be turned in eavesdropping devices. Best-seller <a href="https://fedifreu.de/tags/Sony" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sony</span></a> and <a href="https://fedifreu.de/tags/Bose" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bose</span></a> <a href="https://fedifreu.de/tags/headphones" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>headphones</span></a> are affected by at least some of the disclosed flaws among many others. The true dimension of these flaws is yet unknown as the the vulnerable component is very widely in use under different names.</p><p><a href="https://www.heise.de/en/news/Zero-day-Bluetooth-gap-turns-millions-of-headphones-into-listening-stations-10460704.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Zero-day-Blue</span><span class="invisible">tooth-gap-turns-millions-of-headphones-into-listening-stations-10460704.html</span></a></p><p>Disclosure of the vulnerabilities: <a href="https://insinuator.net/2025/06/airoha-bluetooth-security-vulnerabilities/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">insinuator.net/2025/06/airoha-</span><span class="invisible">bluetooth-security-vulnerabilities/</span></a></p><p>No updates or official statements available yet. ☠️ </p><p><a href="https://fedifreu.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://fedifreu.de/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://fedifreu.de/tags/Audio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Audio</span></a> <a href="https://fedifreu.de/tags/Airoha" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Airoha</span></a> <a href="https://fedifreu.de/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a></p>
CryptGoat<p><a href="https://fedifreu.de/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bluetooth</span></a> was a mistake: "Zero-Day: Bluetooth-Lücke macht Millionen Kopfhörer zu Abhörstationen"<br><a href="https://www.heise.de/news/Zero-Day-Bluetooth-Luecke-macht-Millionen-Kopfhoerer-zu-Abhoerstationen-10457857.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Zero-Day-Bluetoo</span><span class="invisible">th-Luecke-macht-Millionen-Kopfhoerer-zu-Abhoerstationen-10457857.html</span></a></p><p>Da sind u.a. extrem beliebte <a href="https://fedifreu.de/tags/Sony" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sony</span></a> und <a href="https://fedifreu.de/tags/Bose" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bose</span></a>, <a href="https://fedifreu.de/tags/Kopfh%C3%B6rer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kopfhörer</span></a> betroffen. Updates gibt es noch keine. ☠️ </p><p><a href="https://fedifreu.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://fedifreu.de/tags/Headphones" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Headphones</span></a> <a href="https://fedifreu.de/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://fedifreu.de/tags/Audio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Audio</span></a> <a href="https://fedifreu.de/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a></p>