VulnHub

AI-Powered Cybersecurity Intelligence

Last Update Check:

Latest Intelligence

The Hacker News
Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access

Ransomware gangs are increasingly utilizing a malware known as Skitnet to facilitate data theft and gain remote access to compromised systems. This trend, observed since early 2025, highlights the evolving tactics of cybercriminals and the need for enhanced cybersecurity measures.


Impact: Not specified

In the Wild: Yes

Age: Recently disclosed

Remediation: None available

Ransomware Malware

Published:

darkreading
CVE Disruption Threatens Foundations of Defensive Security

The article highlights the potential disruptions in the Common Vulnerabilities and Exposures (CVE) system, warning that ongoing uncertainty could undermine the foundations of defensive security. As repercussions accumulate, the ability to manage vulnerabilities effectively may deteriorate, leading to increased risks for cybersecurity.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

CVE

Published:

darkreading
CVE Disruption Threatens Foundations of Defensive Security

The article discusses the ongoing uncertainty surrounding the Common Vulnerabilities and Exposures (CVE) system and its potential long-term impacts on defensive security measures. If the situation does not improve, the foundational elements of cybersecurity could become increasingly unstable.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

CVE

Published:

SecurityWeek
UK Legal Aid Agency Finds Data Breach Following Cyberattack

The UK’s Legal Aid Agency experienced a cyberattack in April, which has now been confirmed to have resulted in the theft of sensitive data. This incident highlights the ongoing risks and vulnerabilities faced by public sector organizations in safeguarding personal information.


Impact: Not specified

In the Wild: Unknown

Age: Recently disclosed

Remediation: None available

Data Breach

Published:

All CISA Advisories
CISA Adds Six Known Exploited Vulnerabilities to Catalog

CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation, highlighting significant risks for federal agencies and other organizations. These vulnerabilities, including authentication bypass and code injection issues in Ivanti Endpoint Manager Mobile, pose serious threats that necessitate prompt remediation.


Impact: ["Ivanti Endpoint Manager Mobile (EPMM)", "MDaemon Email Server", "Srimax Output Messenger", "Zimbra Collaboration Suite (ZCS)", "ZKTeco BioTime"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Remediate identified vulnerabilities by the due date as per BOD 22-01, prioritize timely remediation of Catalog vulnerabilities.

CVE Vulnerability

Published:

SecurityWeek
480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

A data leak involving Serviceaide has exposed a database containing personal and medical information of approximately 480,000 Catholic Health patients. This significant breach raises concerns about patient privacy and data security within healthcare systems.


Impact: Not specified

In the Wild: Unknown

Age: Recently disclosed

Remediation: Vendor advisory pending

Published:

The Hacker News
Why CTEM is the Winning Bet for CISOs in 2025

Continuous Threat Exposure Management (CTEM) has become a fundamental component of cybersecurity strategies for CISOs, transitioning from a theoretical concept to a practical framework. By integrating Adversarial Exposure Validation (AEV), CTEM enables organizations to continuously align their security measures with real-world risks, enhancing their overall security posture.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

The Hacker News
Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards

Mozilla has patched two critical zero-day vulnerabilities in the Firefox browser that were exploited at Pwn2Own Berlin, potentially allowing attackers to access sensitive data or execute code. The vulnerabilities highlight ongoing security challenges in widely used software and the importance of timely updates.


Impact: ["Firefox browser"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Apply patches

CVE Zero-day Vulnerability

Published:

SecurityWeek
Spiking Neural Networks: Brain-Inspired Chips That Could Keep Your Data Safe

The article discusses the advancement of neuromorphic computing through spiking neural networks, which are brain-inspired processors designed to enhance real-time intelligence and reduce power consumption while ensuring data privacy. This technology is poised to revolutionize edge devices and improve cybersecurity measures.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

SecurityWeek
200,000 Harbin Clinic Patients Impacted by NRS Data Breach

Harbin Clinic reported that the personal information of over 200,000 patients was compromised in a data breach that occurred in July 2024 at Nationwide Recovery Services. This incident highlights the ongoing risks of data breaches in healthcare and the importance of safeguarding patient information.


Impact: Not specified

In the Wild: Unknown

Age: Recently disclosed

Remediation: None available

Data Breach

Published:

The Hacker News
⚡ Weekly Recap: Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More

The article emphasizes the growing challenges faced by cybersecurity leaders as they not only combat attacks but also work to maintain trust and reputation within their organizations. It stresses the necessity of building resilience into digital systems to address hidden vulnerabilities effectively.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Zero-day

Published:

SecurityWeek
Prison Sentence for Man Involved in SEC X Account Hack

Eric Council Jr. has been sentenced to prison for hacking the official X account of the SEC and posting fraudulent content that manipulated Bitcoin prices. This incident highlights the vulnerabilities in social media accounts and the potential for significant financial impact through misinformation.


Impact: ["SEC X account", "Bitcoin"]

In the Wild: No

Age: Recently disclosed

Remediation: None available

Published:

WeLiveSecurity
ESET APT Activity Report Q4 2024–Q1 2025

The ESET APT Activity Report for Q4 2024 and Q1 2025 provides insights into the activities of various Advanced Persistent Threat (APT) groups, highlighting their tactics, techniques, and targets. This analysis is significant as it helps organizations understand the evolving threat landscape and prepare their defenses accordingly.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

SecurityWeek
Hackers Earn Over $1 Million at Pwn2Own Berlin 2025

At Pwn2Own Berlin 2025, hackers successfully demonstrated exploits against a variety of systems, including VMs, AI, browsers, servers, containers, and operating systems, earning over $1 million in total. This event highlights the ongoing security challenges and the need for robust defenses in the face of evolving cyber threats.


Impact: ["VMs", "AI", "browsers", "servers", "containers", "operating systems"]

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

darkreading
Coinbase Extorted, Offers $20M for Info on Its Hackers

Coinbase has taken a bold step in response to cyberattacks by offering $20 million for information leading to the identification of its hackers. This move highlights the growing trend of organizations actively seeking to combat cyber threats in the cryptocurrency and blockchain sectors.


Impact: ["Not specified"]

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published: