Saturday , March 15 2025

Samsung Smartphone Users at Risk of Hacking, Update Now to Protect Yourself

Samsung smartphone users have been warned by the vendor and the US Cyber security and Infrastructure Security Agency (CISA) about a vulnerability that is being actively exploited in attacks. The vulnerability, which is tracked as CVE-2023-21492, is a kernel pointer exposure issue related to log files. It can allow a privileged local attacker to bypass the ASLR exploit mitigation technique, which indicates that it has likely been chained with other bugs.

Samsung patched CVE-2023-21492 with its May 2023 security updates. The company said it learned about the flaw in mid-January and that certain Android 11, 12, and 13 devices are impacted.

Researcher found non protected database form ESHYFT containig 86000 records

Cybersecurity researcher Jeremiah Fowler found and reported a non-password-protected database with over 86,000 records belonging to ESHYFT, a New Jersey-based...
Read More
Researcher found non protected database form ESHYFT containig 86000 records

CVE-2024-55591 and CVE-2025-24472
New SuperBlack ransomware exploits Fortinet flaws

Forescout Research- Vedere Labs identified a series of intrusion based on two Fortinet vulnerabilities which began with the exploitation of...
Read More
CVE-2024-55591 and CVE-2025-24472  New SuperBlack ransomware exploits Fortinet flaws

CVE-2025-25291 & CVE-2025-25292
Attention! GitLab Patched Critical Authentication Bypass Flaws

GitLab has released versions 17.9.2, 17.8.5, and 17.7.7 for its Community and Enterprise Editions to fix security vulnerabilities, including a...
Read More
CVE-2025-25291 & CVE-2025-25292  Attention! GitLab Patched Critical Authentication Bypass Flaws

CVE-2025-20138
Cisco released High Security Alert for IOS XR Software

Cisco has issued a security advisory for a high-severity vulnerability in its IOS XR Software, labeled CVE-2025-20138, with a CVSS...
Read More
CVE-2025-20138  Cisco released High Security Alert for IOS XR Software

400+ IPs Exploiting Multiple SSRF Vulnerabilities

GreyNoise warns of a coordinated increase in the exploitation of Server-Side Request Forgery (SSRF) vulnerabilities across various platforms. "At least...
Read More
400+ IPs Exploiting Multiple SSRF Vulnerabilities

NVIDIA has released update for NVIDIA Riva

NVIDIA has released a software update for Riva to fix security vulnerabilities that could allow privilege escalation, data tampering, denial...
Read More
NVIDIA has released update for NVIDIA Riva

CVE-2025-24201
Apple fixes 0-day exploited in “extremely sophisticated attack”

On Tuesday, Apple fixed a critical zero-day vulnerability affecting nearly all supported iPhones and iPads. The company noted that it...
Read More
CVE-2025-24201  Apple fixes 0-day exploited in “extremely sophisticated attack”

Microsoft’s March 2025 updates fix 7 zero-day, 57 flaws

Microsoft's March 2025 Patch Tuesday update fixes 57 flaws, including seven zero-day exploits, six of which are actively being exploited....
Read More
Microsoft’s March 2025 updates fix 7 zero-day, 57 flaws

Ballista Botnet infects 6000 Unpatched TP-Link Routers

Cato CRTL team said, a new botnet campaign dubbed Ballista target the unpatched TP-Link Archer routers. CVE-2023-1389 is a serious...
Read More
Ballista Botnet infects 6000 Unpatched TP-Link Routers

CVE-2025-24813
Flaw in Apache Tomcat Exposes Servers to RCE

A critical vulnerability, CVE-2025-24813, has been found in Apache Tomcat, which could let attackers execute remote code, leak sensitive data,...
Read More
CVE-2025-24813  Flaw in Apache Tomcat Exposes Servers to RCE

CISA added the bug to its Known Exploited Vulnerabilities (KEV) catalog on Friday, instructing government agencies to patch it by June 9.

The vulnerability was discovered by Google’s Threat Analysis Group, which suggests that it has likely been exploited by a commercial spyware vendor. Google noted in its zero-day exploitation database that CVE-2023-21492 was discovered in 2021.

Reports published by Google in recent months describe campaigns in which threat actors linked to spyware vendors attempted to hack Samsung smartphones through various zero-day and n-day vulnerabilities.

In one such campaign, discovered in December 2022, attackers attempted to deliver Android spyware to users in the United Arab Emirates through the Samsung Internet Browser. The attacks were linked by the internet giant to Variston, a Spanish commercial spyware vendor.

Google has also disclosed the details of several Samsung phone vulnerabilities with a 2021 CVE identifier that had been exploited by a spyware vendor while they still had a zero-day status. The company is aware of nine Samsung vulnerabilities discovered in 2021 that have been exploited in attacks.

In addition to CVE-2023-21492, CISA also added two Cisco IOS vulnerabilities to its KEV catalog on Friday. One of them is CVE-2016-6415, whose existence came to light in 2016 as a result of the Shadow Brokers leaks. The second is a very old DoS vulnerability tracked as CVE-2004-1464. Cisco warned customers about its exploitation back in 2004 when it released patches.

Users of Samsung smartphones are advised to install the May 2023 security updates as soon as possible to protect themselves from this vulnerability. They are also advised to be aware of the signs of a cyberattack, such as unusual pop-ups, redirects, or changes in the behavior of their device. If they suspect that they have been infected with malware, they should contact their IT support or a cybersecurity professional.

Check Also

Falcon Sensor

Sleeping Beauty
Researchers Bypassed CrowdStrike Falcon Sensor partially

SEC Consult researchers found a vulnerability in CrowdStrike’s Falcon Sensor, enabling attackers to evade detection …

Leave a Reply

Your email address will not be published. Required fields are marked *