VulnHub

AI-Powered Cybersecurity Intelligence

Last Update Check:

Latest Intelligence

All CISA Advisories
Siemens TeleControl Server Basic

Siemens TeleControl Server Basic has a vulnerability (CVE-2025-29931) that allows unauthorized remote attackers to exploit improper handling of a length parameter, potentially leading to a denial-of-service condition. The issue particularly affects redundant setups and requires specific conditions to be exploited.


Impact: Siemens TeleControl Server Basic: Versions prior to V3.1.2.2

In the Wild: No

Age: Discovered January 10, 2023

Remediation: Update to version V3.1.2.2 or later, apply recommended network security measures.

CVE Vulnerability Update

Published:

All CISA Advisories
Schneider Electric Wiser Home Controller WHC-5918A

The Schneider Electric Wiser Home Controller WHC-5918A has a serious vulnerability (CVE-2024-6407) that allows unauthorized disclosure of sensitive information, including credentials, through specially crafted messages. The product is discontinued and out of support, making it crucial for users to upgrade or remove the device to mitigate risks.


Impact: Schneider Electric Wiser Home Controller WHC-5918A

In the Wild: No

Age: Discovered recently

Remediation: Upgrade to the latest product offering or remove the device from service; implement network security measures.

Phishing CVE Vulnerability Update

Published:

All CISA Advisories
CISA Releases Five Industrial Control Systems Advisories

CISA has issued five advisories addressing vulnerabilities in various Industrial Control Systems (ICS), highlighting the importance of security in critical infrastructure. Users are urged to review these advisories for detailed technical information and mitigation strategies.


Impact: Siemens TeleControl Server Basic, Schneider Electric Wiser Home Controller WHC-5918A, ABB MV Drives, Schneider Electric Modicon M580 PLCs

In the Wild: Unknown

Age: Disclosed on April 22, 2025

Remediation: Review advisories for technical details and implement recommended mitigations.

Update

Published:

All CISA Advisories
ABB MV Drives

ABB MV Drives have multiple vulnerabilities related to improper input validation and memory buffer restrictions, potentially allowing attackers to gain full access or cause denial-of-service conditions. These vulnerabilities, particularly affecting the CODESYS runtime system, pose significant risks to industrial control systems.


Impact: ABB MV Drives: ACS6080, ACS5000, ACS6000

In the Wild: Unknown

Age: Recently disclosed

Remediation: Apply patches provided by ABB for affected MV Drives.

Phishing CVE Exploit Vulnerability Update

Published:

The Hacker News
5 Major Concerns With Employees Using The Browser

The rise of SaaS and cloud-native work has made web browsers the primary endpoint for employees, yet they remain largely unmonitored, leading to significant security risks. Over 70% of modern malware attacks exploit browser vulnerabilities, highlighting the urgent need for enhanced browser security measures.


Impact: Not specified

In the Wild: Unknown

Age: Recent report findings

Remediation: Implement enhanced monitoring and security protocols for browser usage.

Published:

The Hacker News
Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials

Phishers have executed a highly sophisticated attack by utilizing Google's infrastructure to send legitimate-looking signed emails that direct recipients to fake websites for credential harvesting. This method poses a significant threat as it exploits trusted sources to deceive users.


Impact: Google's email services, Google Sites

In the Wild: Yes

Age: Recently disclosed

Remediation: Users should be cautious of unexpected emails and verify the authenticity of requests for credentials.

Phishing Google Exploit

Published:

WeLiveSecurity
Will super-smart AI be attacking us anytime soon?

The article discusses the current state of AI-related cyber attacks, indicating that while they are not yet at a level of super-intelligence, existing AI attacks are improving in sophistication. This raises concerns about the potential for future threats as AI technology evolves.


Impact: Not specified

In the Wild: Unknown

Age: Not specified

Remediation: None available

Published:

The Hacker News
Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 Breach

Microsoft has migrated its Microsoft Account (MSA) signing service to Azure confidential virtual machines in response to the Storm-0558 breach, enhancing security measures. The company is also transitioning the Entra ID signing service to similar infrastructure to bolster protection against future threats.


Impact: Microsoft Account (MSA), Entra ID

In the Wild: Unknown

Age: Disclosed recently

Remediation: Migrate services to Azure confidential VMs, implement enhanced security measures.

Microsoft

Published:

The Hacker News
Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware

The Lotus Panda cyber espionage group has been linked to a campaign targeting various organizations in Southeast Asia, including a government ministry and an air traffic control organization. This incident highlights the ongoing threat posed by state-sponsored hacking groups in the region.


Impact: Not specified

In the Wild: Yes

Age: Discovered between August 2024 and February 2025

Remediation: None available

Published:

darkreading
DPRK 'IT Workers' Pivot to Europe for Employment Scams

North Korean IT workers are using fraudulent references to secure high-paying jobs in Europe, which in turn funds the DPRK regime. This trend poses a significant threat as it highlights the exploitation of international employment systems for illicit financial gain.


Impact: European job markets, recruitment systems

In the Wild: Yes

Age: Recently disclosed

Remediation: Strengthen verification processes for job applicants, enhance scrutiny on recruitment practices.

Published:

darkreading
In Salt Typhoon's Wake, Congress Mulls Potential Options

In response to the Salt Typhoon cyberattack, the House Committee on Government Reform is exploring potential retaliatory measures while cybersecurity experts emphasize the need for improved defenses. This situation highlights the ongoing challenges in cybersecurity and the importance of proactive measures against threats.


Impact: Not specified in the article

In the Wild: Unknown

Age: Recent context surrounding the Salt Typhoon attack

Remediation: Focus on building better defenses

Published:

SecurityWeek
Serial Entrepreneurs Raise $43M to Counter AI Deepfakes, Social Engineering

A group of serial entrepreneurs has secured $43 million in funding to develop a security platform that uses AI-generated deepfake simulations to replicate real-world attack scenarios. This initiative aims to combat the rising threats of AI deepfakes and social engineering, which pose significant risks to cybersecurity.


Impact: AI-generated deepfake simulations, security platforms

In the Wild: Unknown

Age: Recently disclosed

Remediation: Implement AI-based security training and simulations.

iOS

Published:

SecurityWeek
Vulnerabilities Expose Jan AI Systems to Remote Manipulation

Vulnerabilities in the open source Jan AI system have been identified, allowing for remote, unauthenticated manipulation of the systems. This poses significant risks to the integrity and security of applications using Jan AI.


Impact: Jan AI systems, open source ChatGPT alternatives

In the Wild: Unknown

Age: Recently disclosed

Remediation: Apply patches, update software, implement security measures.

Vulnerability

Published:

SecurityWeek
Cyberhaven Banks $100 Million in Series D, Valuation Hits $1 Billion

Cyberhaven has successfully secured $100 million in Series D funding, achieving a valuation of $1 billion. This reflects ongoing investor confidence in the data security sector amidst growing cybersecurity concerns.


Impact: Cyberhaven

In the Wild: Unknown

Age: Recently disclosed

Remediation: None available

Published:

SecurityWeek
AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor

The emergence of zero-knowledge threat actors, facilitated by AI, signifies a pivotal change in cybercrime, enabling less skilled individuals to conduct sophisticated attacks. This development raises concerns about the accessibility of advanced cyber capabilities to a broader range of potential attackers.


Impact: Cybersecurity systems and defenses across various sectors.

In the Wild: Unknown

Age: Recently disclosed

Remediation: Enhance cybersecurity training, implement advanced threat detection, and update security protocols.

Published: