VulnHub

AI-Powered Cybersecurity Intelligence

Last Update Check:

Latest Intelligence

The Hacker News
New Case Study: Global Retailer Overshares CSRF Tokens with Facebook

A global retailer inadvertently exposed sensitive CSRF tokens to Facebook due to misconfigurations in their security settings. This incident highlights the importance of proper security token management to prevent data leaks and unauthorized tracking.


Impact: CSRF tokens, Facebook pixel tracking system

In the Wild: Unknown

Age: Recently disclosed

Remediation: Implement Reflectiz's recommendations, review and correct security configurations.

Published:

The Hacker News
China-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusions

Cybersecurity researchers have identified a new China-linked threat actor, Earth Alux, which has been conducting multi-stage cyber intrusions targeting critical sectors across the Asia-Pacific and Latin American regions since mid-2023. The significance of this threat lies in its potential impact on various industries including government and technology.


Impact: Government, technology, logistics, manufacturing, telecommunications, IT services, retail sectors

In the Wild: Unknown

Age: First sighting in the second quarter of 2023

Remediation: None available

Published:

SecurityWeek
Check Point Responds to Hacking Claims

Check Point has acknowledged a hacking incident involving sensitive data theft but asserts that the impact was limited. This response highlights ongoing concerns regarding cybersecurity and data protection in the industry.


Impact: Check Point systems

In the Wild: Unknown

Age: Recently disclosed

Remediation: None available

Published:

SecurityWeek
Apple Patches Recent Zero-Days in Older iPhones

Apple has addressed two recent zero-day vulnerabilities in older iPhone models through a significant security update. This action underscores the importance of keeping devices updated to protect against potential exploits.


Impact: Older iPhone models

In the Wild: Unknown

Age: Recently disclosed

Remediation: Apply the latest security updates from Apple.

Zero-day Apple Vulnerability Patch Update

Published:

SecurityWeek
France’s Antitrust Watchdog Fines Apple for Problems With App Tracking Transparency

France's antitrust watchdog has imposed a fine of 150 million euros on Apple due to issues related to its App Tracking Transparency feature, which is intended to protect user privacy. This ruling highlights the ongoing scrutiny of tech giants regarding their privacy practices and the enforcement of antitrust regulations in Europe.


Impact: Apple's App Tracking Transparency feature

In the Wild: No

Age: Recently disclosed

Remediation: None available

Apple

Published:

The Hacker News
Apple Fined €150 Million by French Regulator Over Discriminatory ATT Consent Practices

Apple has been fined €150 million by France's competition authority for discriminatory practices related to its App Tracking Transparency framework, which is seen as an abuse of its dominant position in the mobile app distribution market. This ruling highlights ongoing scrutiny over tech giants' privacy policies and their impact on competition.


Impact: iOS, iPadOS, Apple App Store

In the Wild: No

Age: Discovered in 2021

Remediation: Review and adjust App Tracking Transparency practices to comply with regulatory standards.

iOS Apple

Published:

darkreading
Oracle Cloud Users Urged to Take Action

Oracle has denied any breach of its cloud infrastructure services, yet security experts are advising customers to verify their security status and mitigate potential risks. This situation highlights the importance of proactive security measures in cloud environments.


Impact: Oracle Cloud Infrastructure services

In the Wild: Unknown

Age: Unknown

Remediation: Customers should independently verify their security status and take measures to reduce exposure.

Published:

darkreading
CoffeeLoader Malware Is Stacked With Viscous Evasion Tricks

CoffeeLoader malware has introduced advanced evasion techniques designed to bypass modern security measures, including digital forensics tools and endpoint detection and response (EDR) systems. This evolution in malware poses significant challenges for cybersecurity professionals in mitigating threats.


Impact: Modern security software, digital forensics tools, EDR systems

In the Wild: Unknown

Age: Recently disclosed

Remediation: Enhance security protocols, monitor for unusual activity, and apply threat intelligence updates.

Published:

darkreading
Top 10 Most Used RDP Passwords Are Not Complex Enough

Research from Specops Software highlights that attackers are successfully breaching Remote Desktop Protocol (RDP) systems using weak and basic passwords. This issue underscores the importance of implementing strong password policies to enhance security against unauthorized access.


Impact: Remote Desktop Protocol (RDP), Windows operating systems

In the Wild: Yes

Age: Recently disclosed

Remediation: Implement strong password policies, educate users on password complexity, and consider using multi-factor authentication.

Windows

Published:

darkreading
DoJ Seizes Over $8M from Sprawling Pig Butchering Scheme

The Department of Justice (DoJ) has seized over $8 million linked to a large-scale pig butchering scheme, a type of cryptocurrency scam. This operation highlights the ongoing challenges in tracing illicit funds within the cryptocurrency ecosystem.


Impact: Cryptocurrency accounts involved in the scheme

In the Wild: Unknown

Age: Recently disclosed

Remediation: None available

Published:

darkreading
CISA Warns of Resurge Malware Connected to Ivanti Vuln

CISA has issued a warning regarding the exploitation of a vulnerability in Ivanti Connect Secure, first disclosed by Ivanti in January. This vulnerability is being actively targeted by threat actors, highlighting the urgency for organizations to address the security flaw.


Impact: Ivanti Connect Secure

In the Wild: Yes

Age: Disclosed in January

Remediation: Apply patches provided by Ivanti to mitigate the vulnerability.

Exploit Vulnerability

Published:

The Hacker News
Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp

Russian hackers, identified as the Water Gamayun group, are exploiting a zero-day vulnerability (CVE-2025-26633) in Microsoft Windows to deploy two new backdoors, SilentPrism and DarkWisp. This highlights the ongoing threat posed by advanced persistent threats leveraging newly discovered vulnerabilities.


Impact: Microsoft Windows

In the Wild: Yes

Age: Recently patched

Remediation: Apply the latest security patches from Microsoft.

Windows CVE Zero-day Microsoft Exploit Vulnerability Patch

Published:

darkreading
Trend Micro Open Sources AI Tool Cybertron

Trend Micro has open-sourced its AI tool named Cybertron, designed to enhance threat detection and incident response for organizations. This move signifies a commitment to improving cybersecurity practices through advanced technology.


Impact: Trend Micro Cybertron AI tool

In the Wild: Unknown

Age: Recently disclosed

Remediation: None available

Published:

SecurityWeek
Threat Actors Deploy WordPress Malware in ‘mu-plugins’ Directory

Sucuri has identified various malware families being deployed in the WordPress mu-plugins directory, a tactic used by threat actors to bypass standard security measures. This highlights an ongoing issue with WordPress security that requires urgent attention from site administrators.


Impact: WordPress, mu-plugins directory

In the Wild: Yes

Age: Recently disclosed

Remediation: Regularly scan WordPress installations, monitor mu-plugins directory, and apply security best practices.

Published:

SecurityWeek
Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security Program

The article discusses the importance of developing a robust offensive security program, emphasizing that achieving this may require significant changes in organizational culture and increased costs. Such a program is crucial for effectively addressing evolving cybersecurity threats.


Impact: Organizational security practices, cybersecurity frameworks

In the Wild: Unknown

Age: Unknown

Remediation: Implement organizational and cultural changes, invest in security training and resources.

Published: