Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
14 résultats taggé Actively-Exploited  ✕
CISA: AMI MegaRAC bug enabling server hijacks exploited in attacks https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/
26/06/2025 10:47:30
QRCode
archive.org
thumbnail

CISA says a maximum severity vulnerability in AMI's MegaRAC Baseboard Management Controller (BMC) software, which enables attackers to hijack and brick servers, is currently under active exploitation.
CISA has confirmed that a maximum severity vulnerability in AMI's MegaRAC Baseboard Management Controller (BMC) software is now actively exploited in attacks.

The MegaRAC BMC firmware provides remote system management capabilities for troubleshooting servers without being physically present, and it's used by several vendors (including HPE, Asus, and ASRock) that supply equipment to cloud service providers and data centers.

This authentication bypass security flaw (tracked as CVE-2024-54085) can be exploited by remote unauthenticated attackers in low-complexity attacks that don't require user interaction to hijack and potentially brick unpatched servers.

bleepingcomputer EN 2025 Actively-Exploited American-Megatrends-International AMI Authentication-Bypass CISA MegaRAC CVE-2024-54085
Hackers exploited Windows WebDav zero-day to drop malware https://www.bleepingcomputer.com/news/security/stealth-falcon-hackers-exploited-windows-webdav-zero-day-to-drop-malware/
12/06/2025 08:55:48
QRCode
archive.org
thumbnail

An APT hacking group known as 'Stealth Falcon' exploited a Windows WebDav RCE vulnerability in zero-day attacks since March 2025 against defense and government organizations in Turkey, Qatar, Egypt, and Yemen.

Stealth Falcon (aka 'FruityArmor') is an advanced persistent threat (APT) group known for conducting cyberespionage attacks against Middle East organizations.

The flaw, tracked under CVE-2025-33053, is a remote code execution (RCE) vulnerability that arises from the improper handling of the working directory by certain legitimate system executables.
Specifically, when a .url file sets its WorkingDirectory to a remote WebDAV path, a built-in Windows tool can be tricked into executing a malicious executable from that remote location instead of the legitimate one.

This allows attackers to force devices to execute arbitrary code remotely from WebDAV servers under their control without dropping malicious files locally, making their operations stealthy and evasive.

The vulnerability was discovered by Check Point Research, with Microsoft fixing the flaw in the latest Patch Tuesday update, released yesterday.

bleepingcomputer EN 2025 CVE-2025-33053 Patch-Tuesday Actively-Exploited Espionage Remote-Code-Execution Stealth-Falcon Vulnerability WebDAV Windows Zero-Day
Hacker selling critical Roundcube webmail exploit as tech info disclosed https://www.bleepingcomputer.com/news/security/hacker-selling-critical-roundcube-webmail-exploit-as-tech-info-disclosed/
05/06/2025 19:17:07
QRCode
archive.org
thumbnail

Hackers are actively exploiting CVE-2025-49113, a critical vulnerability in the widely used Roundcube open-source webmail application that allows remote execution.
The security issue has been present in Roundcube for over a decade and impacts versions of Roundcube webmail 1.1.0 through 1.6.10. It received a patch on June 1st.

It took attackers just a couple of days to reverse engineer the fix, weaponize the vulnerability, and start selling a working exploit on at least one hacker forum.

Roundcube is one of the most popular webmail solutions as the product is included in offers from well-known hosting providers such as GoDaddy, Hostinger, Dreamhost, or OVH.
"Email armageddon"

CVE-2025-49113 is a post-authentication remote code execution (RCE) vulnerability that received a critical severity score of 9.9 out of 10 and is described as “email armageddon.”

It was discovered and reported by Kirill Firsov, the CEO of the cybersecurity company FearsOff, who decided to publish the technical details before the end of the responsible disclosure period because an exploit had become available.

bleepingcomputer EN 2025 Actively-Exploited Exploit PHP RCE Remote-Code-Execution Roundcube CVE-2025-49113
SAP fixes suspected Netweaver zero-day exploited in attacks https://www.bleepingcomputer.com/news/security/sap-fixes-suspected-netweaver-zero-day-exploited-in-attacks/
25/04/2025 20:05:47
QRCode
archive.org
thumbnail

SAP has released out-of-band emergency NetWeaver updates to fix a suspected remote code execution (RCE) zero-day flaw actively exploited to hijack servers.

bleepingcomputer EN 2025 Actively-Exploited Authentication-Bypass RCE Remote-Code-Execution SAP Vulnerability Zero-Day
Fortinet discloses second firewall auth bypass patched in January https://www.bleepingcomputer.com/news/security/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/
12/02/2025 08:42:05
QRCode
archive.org
thumbnail

Fortinet has disclosed a second authentication bypass vulnerability that was fixed as part of a January 2025 update for FortiOS and FortiProxy devices.

bleepingcomputer Actively-Exploited Authentication-Bypass Fortinet FortiOS FortiProxy Zero-Day
Apple fixes this year’s first actively exploited zero-day bug https://www.bleepingcomputer.com/news/security/apple-fixes-this-years-first-actively-exploited-zero-day-bug/
28/01/2025 08:34:50
QRCode
archive.org
thumbnail

​Apple has released security updates to fix this year's first zero-day vulnerability, tagged as actively exploited in attacks targeting iPhone users.

bleepingcomputer EN 2025 Actively-Exploited Apple iOS iPhone Zero-Day
Hackers exploit Roundcube webmail flaw to steal email, credentials https://www.bleepingcomputer.com/news/security/hackers-exploit-roundcube-webmail-flaw-to-steal-email-credentials/
22/10/2024 14:48:04
QRCode
archive.org
thumbnail

Threat actors have been exploiting a vulnerability in the Roundcube Webmail client to target government organizations in the Commonwealth of Independent States (CIS) region, the successor of the former Soviet Union.

bleepingcomputer EN 2024 Actively-Exploited CVE-2024-37383 Cross-Site-Scripting Email Roundcube Vulnerability XSS
Black Basta ransomware gang linked to Windows zero-day attacks https://www.bleepingcomputer.com/news/security/black-basta-ransomware-gang-linked-to-windows-zero-day-attacks/
16/06/2024 00:11:34
QRCode
archive.org
thumbnail

The Cardinal cybercrime group (Storm-1811, UNC4394), who are the main operators of the Black Basta ransomware, is suspected of exploiting a Windows privilege escalation vulnerability, CVE-2024-26169, before a fix was made available.

bleepingcomputer en 2024 Actively-Exploited Black-Basta Ransomware Vulnerability Zero-Day CVE-2024-26169
WP Automatic WordPress plugin hit by millions of SQL injection attacks https://www.bleepingcomputer.com/news/security/wp-automatic-wordpress-plugin-hit-by-millions-of-sql-injection-attacks/
27/04/2024 19:23:36
QRCode
archive.org
thumbnail

Hackers have started to target a critical severity vulnerability in the WP Automatic plugin for WordPress to create user accounts with administrative privileges and to plant backdoors for long-term access.

bleepingcomputer EN 2024 Actively-Exploited Plugin SQL-Injection Vulnerability WordPress WP-Automatic
Exploit released for Fortinet RCE bug used in attacks, patch now https://www.bleepingcomputer.com/news/security/exploit-released-for-fortinet-rce-bug-used-in-attacks-patch-now/
21/03/2024 16:51:25
QRCode
archive.org
thumbnail

Security researchers have released a proof-of-concept (PoC) exploit for a critical vulnerability in Fortinet's FortiClient Enterprise Management Server (EMS) software, which is now actively exploited in attacks.

bleepingcomputer EN 2024 Actively-Exploited Exploit Fortinet PoC Proof-of-Concept RCE Remote-Code-Execution SQL-Injection CVE-2023-48788
Hackers are exploiting critical Apache Struts flaw using public PoC https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-critical-apache-struts-flaw-using-public-poc/
13/12/2023 17:21:24
QRCode
archive.org
thumbnail

Hackers are attempting to leverage a recently fixed critical vulnerability (CVE-2023-50164) in Apache Struts that leads to remote code execution, in attacks that rely on publicly available proof-of-concept exploit code.

bleepingcomputer EN 2023 Actively-Exploited Apache-Struts PoC Proof-of-Concept RCE Remote-Code-Execution CVE-2023-50164
Sophos backports RCE fix after attacks on unsupported firewalls https://www.bleepingcomputer.com/news/security/sophos-backports-rce-fix-after-attacks-on-unsupported-firewalls/
12/12/2023 18:58:12
QRCode
archive.org
thumbnail

Sophos was forced to backport a security update for CVE-2022-3236 for end-of-life (EOL) firewall firmware versions after discovering hackers actively exploiting the flaw in attacks.

bleepingcomputer En 2023 Actively-Exploited Firewall RCE Remote-Code-Execution Security-Update Sophos
Qualcomm says hackers exploit 3 zero-days in its GPU, DSP drivers https://www.bleepingcomputer.com/news/security/qualcomm-says-hackers-exploit-3-zero-days-in-its-gpu-dsp-drivers/
03/10/2023 17:31:45
QRCode
archive.org
thumbnail

Qualcomm is warning of three zero-day vulnerabilities in its GPU and Compute DSP drivers that hackers are actively exploiting in attacks.

bleepingcomputer EN 2023 Actively-Exploited Android Mobile Qualcomm Vulnerability Zero-Day GPU Adreno
Ivanti warns of new actively exploited MobileIron zero-day bug https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-actively-exploited-mobileiron-zero-day-bug/
21/08/2023 18:01:30
QRCode
archive.org
thumbnail

US-based IT software company Ivanti warned customers today that a critical Sentry API authentication bypass vulnerability is being exploited in the wild.

bleepingcomputer Ivanti Actively-Exploited Authentication-Bypass Ivanti MobileIron Warning Zero-Day 0-day
4580 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio