From The source
Fortinet Fiasco: Urgent Fix Needed for New Vulnerability in a Week!
CISA updates its Known Exploited Vulnerabilities Catalog with a new entry, spotlighting a Fortinet vulnerability. Cyber actors are likely thrilled, but not as much as the IT teams now scrambling to patch it within a week. FortiWeb users, buckle up and check out BOD 23-02 for tips on minimizing online exposure.
METZ CONNECT’s Firmware Fiasco: Hackers’ Dream or IT’s Worst Nightmare?
View CSAF: The METZ CONNECT EWIO2 devices have vulnerabilities so severe, they might as well leave the front door open with cookies on the table. With a CVSS v4 score of 9.3, these vulnerabilities allow remote attackers to bypass authentication and execute arbitrary code. Time to update that firmware and keep your network safe!
Schneider Electric’s PowerChute: Path to Hilarity with Path Traversal Vulnerabilities!
View CSAF to witness a vulnerability comedy of errors! Schneider Electric’s PowerChute Serial Shutdown is experiencing a CVSS v3.0-level identity crisis. With path traversal, authentication fails, and default permissions gone rogue, it’s a hacker’s playground! But fear not, version 1.4 swoops in like a digital superhero to save the day!
Shelly Pro 3EM Vulnerability: When Your Smart Switch Gets a Little Too Smart!
Shelly’s Pro 3EM has a vulnerability so serious it could knock the device offline with a single crafty Modbus request! Dubbed CVE-2025-12056, this out-of-bounds read bug needs attention—ignore it, and you’ll have a smart switch stuck on the dumb setting. Users, update your systems and keep those firewalls tighter than a drum!
Shelly’s Shellshock: Pro 4PM Vulnerability Sparks Denial-of-Service Drama!
An unpatched Shelly Pro 4PM could have you seeing red with a denial-of-service condition! Due to unchecked input bounds, your smart switch might just outsmart itself by rebooting. While Shelly’s ghosting CISA, users should update past version 1.6 to avoid the technical equivalent of a toddler’s tantrum. View CSAF for more details.
Schneider Electric Security Snafu: Broken Cryptography Puts SCADA Systems at Risk!
View CSAF: Schneider Electric’s EcoStruxure Machine SCADA Expert and Pro-face BLUE Open Studio are caught in a tango with a broken cryptographic algorithm. With a CVSS v4 score of 8.3, this vulnerability could turn confidentiality into an open secret. Patch up with 2023.1 Patch 1 or risk a cybersecurity punchline you won’t find funny!
Beware: Fake CAPTCHA Scams Hijacking Clipboards with Malicious Commands!
KongTuke, also known as LandUpdate808, uses fake CAPTCHA pages to trick users with a ClickFix-style lure. This crafty tactic hijacks the clipboard, leading victims into running a malicious PowerShell script. Remember, folks, not all CAPTCHAs are created equal—some just want you to solve the riddle of infection!
Cyber Heist Chronicles: From RDP to Ransomware in 9 Days!
The Time to Ransomware (TTR) for this intrusion was about 178 hours, spanning nine days. That’s faster than most people finish reading a novel! It all started with an RDP login using compromised credentials, leading to a whirlwind of lateral movement, credential juggling, and a ransomware finale.
When Tech Tools Have a Sense of Humor: Why Binary Expressions Aren’t Just for Mathletes!
When Xavier tried decoding a string using numbers-to-hex.py, he ended up with a smiley face instead of POWERSHELL. Classic! Turns out, binary numeric expressions like 79+1 threw a wrench in the works. After a quick update, Didier Stevens’ tool can now handle these pesky expressions, saving smiles for emojis.
Beware the Finger: Ancient Command Sparks Modern Cyber Mischief
In the world of cyber antics, finger.exe is the retired athlete making a comeback in ClickFix attacks. This vintage UNIX command, now a Windows classic, fetches malicious scripts like a dog retrieves a frisbee. Remember, if your corporate network is a fortress of proxies, finger.exe will have a tough time getting through.
SANS Holiday Hack Challenge 2025: Unwrap the Fun and Test Your Cyber Skills!
Get ready for a sleigh ride through cyberland! The SANS Holiday Hack Challenge 2025 is here, promising festive fun and brain-boggling puzzles. It’s like eggnog for your neurons, minus the calories. Dive in and unwrap the challenges before Santa does!
Beware: CVE-2025-64446 Exploit Attempts Creating Admins Faster Than You Can Say ‘Oops!’
Our honeypots are buzzing with exploit attempts for CVE-2025-64446, creating new admin users faster than you can say “cybersecurity breach.” It’s like hackers are hosting their own admin party, and everyone’s invited—except you!
Malware Mayhem: Gh0st RAT’s Chinese Whispers and the Rise of Digital Doppelgangers
The rise of impersonation at scale is a persistent threat to Chinese-speaking users. Hackers, capitalizing on popular software, have taken brand impersonation to an art form with campaigns that evolved from simple droppers to complex multi-stage infection chains. So, if your “Youdao” download suddenly speaks Parseltongue, you might want to double-check its origins.
Fortinet FortiWeb Users: Watch Out for CVE-2025-64446 Vulnerability – Upgrade Now!
CISA has raised the alarm on the CVE-2025-64446 vulnerability in Fortinet FortiWeb, a relative path traversal bug. This digital gremlin could let uninvited guests run administrative commands. Fortinet suggests upgrading faster than your morning coffee brews. Remember, folks, prevention is the best firewall against chaos!
Uh-Oh, Fortinet! CISA Flags New Vulnerability in KEV Catalog
CISA has added CVE-2025-64446 to its Known Exploited Vulnerabilities Catalog. This Fortinet FortiWeb Path Traversal Vulnerability is a cybercriminal’s dream come true, posing a significant risk to federal enterprises. Remember, in cybersecurity, ignoring alerts is like leaving your front door open while shouting, “Free cookies inside!”
Thunderbird 145: Zapping Bugs Faster Than Your Inbox Fills Up!
The Mozilla Foundation has squashed some pesky bugs in Thunderbird 145. While email scripting is safely out of bounds, these vulnerabilities might have been a browser’s worst nightmare. Rest easy, though, because Thunderbird’s got your back.
Unpacking the Malware Matryoshka: RTF Exploits Hidden in Office Docs!
Ever seen a Microsoft Office document that acts like Russian dolls? Thanks to crafty hackers, malicious RTF files are now hiding inside OOXML documents. It’s like malware inception, but with more coding and fewer dreamscapes. The Equation Editor exploit is alive and kicking, proving that some exploits just refuse to retire gracefully.
Glass Cage or Glass House? The Drama Behind iMessage Zero-Click Exploit Claims
Full Disclosure mailing list gets a dose of drama as users debate the authenticity of the “Glass Cage” zero-click iMessage exploit. While some claim it’s AI-generated fluff, others are left scratching their heads. Is it a true tech threat or just another case of cyber smoke and mirrors? Stay tuned!
Apple Compressor 4.11.1 Update: Keeping Hackers at Bay with a Dash of Security!
Apple’s Compressor 4.11.1 update is here to save the day like a digital superhero, addressing a security flaw that could let unauthorized users run wild with arbitrary code. Remember, even your software needs a little TLC now and then! Get the update on the App Store and keep your network safe and sound.
Printer Panic: 83 Vasion Vulnerabilities Exposed! 🚨
PrinterLogic’s vulnerabilities are multiplying faster than rabbits! With 83 issues, it’s almost like their printers have decided to redefine “print overload.” Dive into the chaos as Pierre Kim uncovers the latest CVEs, proving that sometimes the scariest jams aren’t paper-related.
