Friday , May 9 2025

TimeLine Layout

March, 2025

  • 23 March

    Oracle refutes breach after hacker claims 6 million data theft

    million

    A hacker known as “rose87168” claims to have stolen six million records from Oracle Cloud servers. The stolen data includes Java Key Store (JKS) files, encrypted Single Sign-On (SSO) passwords, hashed LDAP passwords, key files, and Enterprise Manager Java Platform Security (JPS) keys. Stolen Data on Dark Web Forums: Stolen …

    Read More »
  • 22 March

    Russian zero-day seller to offer up to $4 million for Telegram exploits

    $4 million

    Operation Zero, a Russian zero-day broker, is offering up to $4 million for Telegram exploits. They seek $500K for one-click RCE, $1.5M for zero-click RCE, and $4M for a full-chain exploit that can fully compromise a device. The firm only sells exploits to the Russian government and local companies. We …

    Read More »
  • 21 March

    Cybercriminals Exploit Checkpoint’s Driver in a BYOVD Attack

    CheckPoint

    Threat actors are exploiting a component of CheckPoint’s ZoneAlarm antivirus to bypass Windows security measures. Nima Bagheri, a security researcher in Austin and founder of Venak Security, announced a new Bring Your Own Vulnerable Driver (BYOVD) attack in a report on March 20. Threat actors exploited vulnerabilities in vsdatant.sys, a …

    Read More »
  • 21 March

    IBM and Veeam Release Patches in AIX System and Backup

    AIX System

    IBM has resolved two critical vulnerabilities in its AIX operating system that could allow command execution. The list of shortcomings, which impact AIX versions 7.2 and 7.3, is below: CVE-2024-56346 (CVSS score: 10.0) – A vulnerability that allows a remote attacker to run any commands through the AIX nimesis NIM …

    Read More »
  • 19 March

    WhatsApp patched zero-click flaw exploited in spyware attacks

    zero-click

    WhatsApp has patched a zero-click, zero-day vulnerability used to install Paragon’s Graphite spyware following reports from security researchers at the University of Toronto’s Citizen Lab. The company addressed the attack vector late last year “without the need for a client-side fix” and decided not to assign a CVE-ID after “reviewing …

    Read More »
  • 19 March

    CVE-2025-24472
    CISA Warns of Fortinet FortiOS Auth Bypass Vuln Exploited in Wild

    FortiOS

    CISA has issued a critical alert about a critical vulnerability in Fortinet’s FortiOS and FortiProxy systems. CVE-2025-24472, an authentication bypass vulnerability, has been added to CISA’s Known Exploited Vulnerabilities catalog. Fortinet FortiOS Authentication Bypass Vulnerability: Fortinet FortiOS and FortiProxy contain an authentication bypass vulnerability that allows a remote attacker to …

    Read More »
  • 19 March

    11 state hackers exploit new Windows zero-day since 2017

    Windows

    11 nation-state groups from North Korea, China, and Russia are exploiting a vulnerability in a common feature of Microsoft Windows. Researchers at the Zero Day Initiative (ZDI) have found several campaigns exploiting the bug in Windows shortcut (.lnk) files, dating back to 2017. Microsoft hasn’t assigned a CVE number, but …

    Read More »
  • 18 March

    Hackers Exploit ChatGPT with CVE-2024-27564

    ChatGPT

    Attackers are actively targeting OpenAI, exploiting CVE-2024-27564, a Server-Side Request Forgery (SSRF) vulnerability in OpenAI’s ChatGPT infrastructure. Veriti’s latest research reveals that this vulnerability, despite being classified as medium severity, has already been weaponized in real world attacks. Research uncovers: Active exploitation in the wild, with over 10,479 attack attempts …

    Read More »
  • 18 March

    (CVE-2024-540385)
    CVSS 10 Alert! HPE Cray Vulnerability Authentication Bypass Threat

    HPE

    A critical vulnerability, CVE-2024-540385, has been found in HPE Cray XD670 servers using the AMI BMC Redfish API, allowing remote authentication bypass. Administrators must act quickly to prevent the exploitation. According to HPE’s security bulletin, “This vulnerability could be remotely exploited to allow authentication bypass.” An attacker could gain unauthorized …

    Read More »
  • 18 March

    CVE-2025-24813
    Apache Tomcat Flaw Exploited In The Wild

    Apache Tomcat

    CVE-2025-24813, a critical remote code execution vulnerability, is actively exploited, enabling attackers to control vulnerable Apache Tomcat servers with a single PUT API request, reports Wallarm. The exploit, shared by a user on a Chinese forum, takes advantage of Tomcat’s default session persistence and its ability to handle partial PUT …

    Read More »

This will close in 6 seconds