VulnHub

AI-Powered Cybersecurity Intelligence

Last Update Check:

Latest Intelligence

SecurityWeek
Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023

Radware has confirmed that the vulnerabilities in their Cloud WAF product, which were disclosed by CERT/CC, were patched two years ago. This highlights the importance of timely updates and vulnerability management in cybersecurity.


Impact: ["Radware Cloud WAF"]

In the Wild: No

Age: Older vulnerability

Remediation: The vulnerabilities were addressed with patches issued two years ago.

Published:

All CISA Advisories
CISA Adds Five Known Exploited Vulnerabilities to Catalog

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation, highlighting significant risks to federal networks. The vulnerabilities primarily affect Microsoft Windows components, emphasizing the need for timely remediation to protect against cyber threats.


Impact: ["Microsoft Windows DWM Core Library", "Microsoft Windows Common Log File System (CLFS) Driver", "Microsoft Windows Scripting Engine", "Microsoft Windows Ancillary Function Driver for WinSock"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Federal agencies are required to remediate identified vulnerabilities by the due date; all organizations are urged to prioritize timely remediation.

Windows CVE Microsoft Vulnerability

Published:

All CISA Advisories
Hitachi Energy Service Suite

The Hitachi Energy Service Suite has multiple critical vulnerabilities, including HTTP request smuggling and resource allocation issues, that could potentially compromise the confidentiality, integrity, or availability of affected devices. These vulnerabilities are significant as they can be exploited remotely with low complexity, posing a serious risk to users of the affected software versions.


Impact: ["Hitachi Energy Service Suite: Versions 9.8.1.3 and prior", "Apache HTTP Server 2.4.53 and earlier"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: Users are advised to apply patches and update to the latest versions of the affected software.

Windows Phishing CVE Vulnerability Update

Published:

All CISA Advisories
Hitachi Energy MACH GWS Products

Hitachi Energy's MACH GWS products have multiple critical vulnerabilities that could allow attackers to execute code, hijack sessions, or access sensitive files without authentication. The vulnerabilities, which have been rated with high CVSS scores, emphasize the need for immediate updates and security practices to protect critical infrastructure systems.


Impact: ["Hitachi Energy MACH GWS: Version 2.1.0.0", "Hitachi Energy MACH GWS: Versions 2.2.0.0 to 2.4.0.0", "Hitachi Energy MACH GWS: Versions 3.0.0.0 to 3.3.0.0", "Hitachi Energy MACH GWS: Versions 3.1.0.0 to 3.3.0.0"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: Users should update to specified versions or apply patches as recommended by Hitachi Energy.

Phishing CVE Exploit Vulnerability Patch Update

Published:

All CISA Advisories
Hitachi Energy Relion 670/650/SAM600-IO Series

Hitachi Energy's Relion 670/650/SAM600-IO series has a critical vulnerability that allows potential attackers to exploit a buffer overflow, leading to device reboots and denial-of-service conditions. This issue affects multiple versions of the product and requires immediate attention to mitigate risks associated with operational disruptions.


Impact: ["Relion 670/650/SAM600-IO series: Versions 2.2.2.0 up to but not including 2.2.2.6", "Relion 670/650/SAM600-IO series: Versions 2.2.3.0 up to but not including 2.2.3.7", "Relion 670/650/SAM600-IO series: Versions 2.2.4.0 up to but not including 2.2.4.4", "Relion 670/650/SAM600-IO series: Versions 2.2.5.6 up to but not including 2.2.5.6", "Relion 670/650/SAM600-IO series: 2.2.0.x", "Relion 670/650/SAM600-IO series: 2.2.1.x"]

In the Wild: No

Age: Recently disclosed

Remediation: Update to the latest versions specified or apply general mitigations as recommended by Hitachi Energy.

Phishing CVE Exploit Vulnerability Update

Published:

All CISA Advisories
ABB Automation Builder

ABB Automation Builder has vulnerabilities that allow attackers to overrule user management, potentially compromising system integrity. These vulnerabilities, identified as CVE-2025-3394 and CVE-2025-3395, pose significant risks to the security of automation projects deployed worldwide.


Impact: ["ABB Automation Builder", "AC500 V2", "SM560-S devices"]

In the Wild: No

Age: Recently disclosed

Remediation: Apply workarounds by adjusting project settings for security integrity and encryption.

CVE Vulnerability Update

Published:

SecurityWeek
Marks & Spencer Says Data Stolen in Ransomware Attack

Marks & Spencer has confirmed that personal data was compromised during a recent ransomware attack attributed to a cybercriminal group. This incident highlights the ongoing threat of ransomware and its potential impact on consumer trust and data security.


Impact: Not specified

In the Wild: Unknown

Age: Recently disclosed

Remediation: None available

Ransomware Data Breach

Published:

The Hacker News
Deepfake Defense in the Age of AI

The article discusses the increasing threat of deepfake technology in cybersecurity, highlighting how attackers use generative AI to impersonate trusted individuals and automate social engineering attacks. It emphasizes the need for proactive prevention strategies rather than mere detection of these sophisticated threats.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: Implement proactive prevention strategies

Published:

SecurityWeek
Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying

A Turkey-affiliated espionage group has been exploiting a zero-day vulnerability in Output Messenger since April 2024, targeting Iraq for spying activities. This incident highlights the ongoing risks posed by zero-day vulnerabilities in communication software.


Impact: ["Output Messenger"]

In the Wild: Yes

Age: Discovered in April 2024

Remediation: Vendor advisory pending

Zero-day Vulnerability

Published:

The Hacker News
North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress

The North Korean Konni APT has initiated a phishing campaign aimed at Ukrainian government entities to gather intelligence on the ongoing Russian invasion. This marks a significant expansion of the group's targeting strategy beyond its historical focus on Russia.


Impact: Not specified

In the Wild: Yes

Age: Recently disclosed

Remediation: None available

Phishing Malware Threat Actor

Published:

SecurityWeek
Suspected DoppelPaymer Ransomware Group Member Arrested

A 45-year-old man was arrested in Moldova for his alleged participation in the DoppelPaymer ransomware attacks, highlighting ongoing efforts to combat cybercrime. This arrest underscores the significance of international cooperation in addressing ransomware threats.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Ransomware

Published:

Securelist
Using a Mythic agent to optimize penetration testing

The article discusses the use of a Mythic agent to enhance the efficiency of penetration testing, particularly in relation to the Cobalt Strike framework. This optimization is significant as it aids cybersecurity professionals in identifying vulnerabilities more effectively.


Impact: ["Mythic framework", "Cobalt Strike"]

In the Wild: Unknown

Age: Unknown

Remediation: See source

Published:

SecurityWeek
Orca Snaps Up Opus in Cloud Security Automation Push

Orca has acquired Opus to enhance its capabilities in AI-driven autonomous remediation and prevention within cloud security. This strategic move signifies Orca's commitment to advancing cloud security automation, addressing growing concerns in cybersecurity.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

darkreading
North Korea's TA406 Targets Ukraine for Intel

North Korea's TA406 group is targeting Ukraine to gather intelligence on the situation of its troops deployed there and to assess Russia's intentions. This activity underscores the geopolitical implications of cyber operations in conflict zones.


Impact: Not specified

In the Wild: Unknown

Age: Unknown

Remediation: None available

Published:

SecurityWeek
CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor

CISA has added an information exposure flaw in the TeleMessage app to its Known Exploited Vulnerabilities catalog, highlighting the security risks associated with this application. The flaw's significance is underscored by its usage by high-profile individuals, including a former National Security Advisor.


Impact: ["TeleMessage app"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: Apply patches

Vulnerability

Published: