Wednesday , April 23 2025

infosecbulletin

Zyxel released patches 2 vulns in its USG FLEX H series firewalls

USG FLEX H series

Zyxel Networks has issued critical security patches for two high-severity vulnerabilities in its USG FLEX H series firewalls. These flaws could let attackers gain unauthorized access and escalate their privileges on the devices. On April 22, 2025, a security advisory was released outlining patches for CVE-2025-1731 and CVE-2025-1732, affecting various …

Read More »

South Korea’s largest SK Telecom Hit by Malware: SIM-related info leaked

SK Telecom

South Korea’s largest mobile operator, SK Telecom, is warning that a malware infection allowed threat actors to access sensitive USIM-related information for customers. SK Telecom is the largest mobile network operator in South Korea, holding approximately 48.4% of the mobile phone service market in the country, corresponding to 34 million subscribers. The …

Read More »

ChatGPT Develops Exploit for CVEs Before Public PoCs Share

exploit

Security researcher Matt Keeley showed that artificial intelligence can now develop working exploits for critical vulnerabilities before public proof-of-concept (PoC) exploits are released, potentially changing vulnerability research. Keeley used GPT-4 to create an exploit for CVE-2025-32433, a serious Erlang/OTP SSH vulnerability rated 10.0 on the CVSS scale. This demonstrates the …

Read More »

TP-Link Router Vulns Allow to Execute Malicious SQL Commands

SQL

Several vulnerabilities have been found in TP-Link routers, exposing users to serious security risks from SQL injection flaws in their web management interfaces. Security researcher “The Veteran” found vulnerabilities that let remote attackers bypass authentication and gain unauthorized control of devices without valid credentials. TP-Link Router Vulnerabilities: CVE-2025-29648: TP-Link EAP120 …

Read More »

Amazon Follows Microsoft’s Lead, Halts Some Data Center Deals

Data Center

Amazon has paused some data center lease negotiations for its cloud division, particularly in international markets, according to Wells Fargo analysts on Monday. “This is routine capacity management, and there haven’t been any recent fundamental changes in our expansion plans,” said Kevin Miller, vice president of Amazon Web Services (AWS) …

Read More »

Hackers Exploit Zoom’s Remote Control Feature for System Access

Zoom's Remote Control Feature

ELUSIVE COMET is a threat actor conducting a sophisticated attack campaign that uses Zoom’s remote control feature to access victims’ computers without permission. The ELUSIVE COMET operation begins with attackers masquerading as legitimate media organizations, specifically “Bloomberg Crypto,” to invite high-profile targets for interviews. Invitations are sent through social media, …

Read More »

Registration open for ‘𝐔𝐀𝐏 𝐂𝐘𝐁𝐄𝐑 𝐒𝐈𝐄𝐆𝐄 𝟐𝟎𝟐𝟓’

𝐔𝐀𝐏 𝐂𝐘𝐁𝐄𝐑 𝐒𝐈𝐄𝐆𝐄

𝐓𝐡𝐞 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐥𝐮𝐛 of University of Asia Pacific (UAP) is going to arrange ‘𝐔𝐀𝐏 𝐂𝐘𝐁𝐄𝐑 𝐒𝐈𝐄𝐆𝐄 𝟐𝟎𝟐𝟓’ 𝐂𝐚𝐩𝐭𝐮𝐫𝐞 𝐓𝐡𝐞 𝐅𝐥𝐚𝐠 (𝐂𝐓𝐅) Competition on 3rd may 2025. Registration has been open for the contest, anyone who are qualified as per the contest rule can register through this link. Actually, it …

Read More »
Trending Threat Actor: Lockbit, Lazarus, Blackcat, Cybercriminals, SaltTyphoon, Scttered Spider, RedGolf, BlueBravo, North Korean Hackers, ...
Trending Malware: SocGholish, Colabtstrike, Linuxkernel, Plugx, Lockbit, Xmrig, REMCOM RAT, Play Ransomware, LummaC2, HijackLoader, BugSleep
Trending vulnerability:CVE: 2024-21887, CVE: 2024-6387, CVE: 2024-46805, CVE: 2017-11882, CVE: 2021-44228, CVE:2024-40348, CVE: 2024-38112
Techniques: T1059.001, T1082, T1486, T1190, T1083
Tactics: TA0007, TA0001, TA0005, TA0011
23:23