Фильтр публикаций


🚨 News Alert!

Title: Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP
Link: https://thehackernews.com/2025/01/hackers-deploy-malicious-npm-packages.html


🚨 News Alert!

Title: Product Walkthrough: How Satori Secures Sensitive Data From Production to AI
Link: https://thehackernews.com/2025/01/product-walkthrough-how-satori.html


🚨 News Alert!

Title: ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]
Link: https://thehackernews.com/2025/01/thn-weekly-recap-top-cybersecurity_20.html


🚨 News Alert!

Title: DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection
Link: https://thehackernews.com/2025/01/donot-team-linked-to-new-tanzeem.html


🚨 News Alert!

Title: Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers
Link: https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html


🚨 News Alert!

Title: CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits
Link: https://thehackernews.com/2025/01/cert-ua-warns-of-cyber-scams-using-fake.html


ok i didnt ask you to send every article


🚨 News Alert!

Title: CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits
Link: https://thehackernews.com/2025/01/cert-ua-warns-of-cyber-scams-using-fake.html


🚨 News Alert!

Title: PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers
Link: https://thehackernews.com/2025/01/pngplug-loader-delivers-valleyrat.html


🚨 News Alert!

Title: HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects
Link: https://thehackernews.com/2025/01/hackgate-setting-new-standards-for.html


🚨 News Alert!

Title: Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties
Link: https://thehackernews.com/2025/01/ex-cia-analyst-pleads-guilty-to-sharing.html


🚨 News Alert!

Title: 13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks
Link: https://thehackernews.com/2025/01/13000-mikrotik-routers-hijacked-by.html


🚨 News Alert!

Title: Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers
Link: https://thehackernews.com/2025/01/murdocbotnet-found-exploiting-avtech-ip.html


DNS Record Change Detected
Domain: patched.to
Record Type: SOA
Time Detected: 2025-01-21 04:29:53 UTC
Previous Records:
karina.ns.cloudflare.com. dns.cloudflare.com. 2362912684 10000 2400 604800 1800
New Records:
karina.ns.cloudflare.com. dns.cloudflare.com. 2362919467 10000 2400 604800 1800


Репост из: Dark Web Informer - Cyber Threat Intelligence - CVE Alerts
🔗 DarkWebInformer.com - Cyber Threat Intelligence
📌 CVE ID: CVE-2025-22146
🔹 Description: Sentry is a developer-first error tracking and performance monitoring tool. A critical vulnerability was discovered in the SAML SSO implementation of Sentry. It was reported to us via our private bug bounty program. The vulnerability allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance. The victim email address must be known in order to exploit this vulnerability. The Sentry SaaS fix was deployed on Jan 14, 2025. For self hosted users; if only a single organization is allowed `(SENTRY_SINGLE_ORGANIZATION = True)`, then no action is needed. Otherwise, users should upgrade to version 25.1.0 or higher. There are no known workarounds for this vulnerability.
📏 Published: 2025-01-15T19:57:59.734Z
📏 Modified: 2025-01-15T20:44:47.931Z
🔗 References:
1. https://github.com/getsentry/sentry/security/advisories/GHSA-7pq6-v88g-wf3w
2. https://github.com/getsentry/sentry/pull/83407




Репост из: Dark Web Informer - Cyber Threat Intelligence - Live Threat Feed
🔗 DarkWebInformer.com - Cyber Threat Intelligence
📅 Date: 2025-01-21 03:02:38
🚨 Title: Alleged sale of unauthorized access to multiple POS machines in the USA
🛡️ Victim Country: USA
🏭 Victim Industry:
🏢 Victim Organization:
🌐 Victim Site:
📜 Category: Initial Access
🕵️‍♂️ Threat Actor: nixploiter
🌍 Network: openweb
🔗 Claim: https://forum.exploit.in/topic/253015/
📝 Description: The threat actor is offering to sell unauthorized admin access to a large number of point-of-sale (POS) machines in the USA. They claim to have access to over 111 active POS machines. All machines are different store POS machines of USA.

Access type: RMM software admin panel. (full admin, remote control, root shell available)

OS: Windows 7,8,10,11

Software: Various POS software.


DNS Record Change Detected
Domain: patched.to
Record Type: SOA
Time Detected: 2025-01-21 02:42:45 UTC
Previous Records:
karina.ns.cloudflare.com. dns.cloudflare.com. 2362911261 10000 2400 604800 1800
New Records:
karina.ns.cloudflare.com. dns.cloudflare.com. 2362912684 10000 2400 604800 1800


💡Common Network Protocols


DNS Record Change Detected
Domain: patched.to
Record Type: SOA
Time Detected: 2025-01-21 02:15:58 UTC
Previous Records:
karina.ns.cloudflare.com. dns.cloudflare.com. 2362460657 10000 2400 604800 1800
New Records:
karina.ns.cloudflare.com. dns.cloudflare.com. 2362911261 10000 2400 604800 1800

Показано 20 последних публикаций.