Saturday , February 22 2025

TimeLine Layout

February, 2025

  • 11 February

    SAP Security Patch February 2025: Multi Vulns Addressed

    Security Patch

    SAP has issued new security patches for 19 vulnerabilities and updated 2 previous Security Notes. This Patch Day features fixes for various issues, including a high-risk authorization flaw in SAP BusinessObjects Business Intelligence. The critical vulnerability (CVE-2025-0064, CVSS 8.7) enables an attacker with admin rights to impersonate any user in …

    Read More »
  • 11 February

    TRACKING RANSOMWARE
    Akira Topped January 2025 as the Most Active Ransomware Threat

    January 2025

    In January 2025, there were 510 global ransomware incidents, with Akira as the leading group and new ones like MORPHEUS and Gd Lockersec appearing. The Manufacturing sector was the main target, followed by Finance and IT, with the USA being the most affected region. This report highlights key ransomware trends, …

    Read More »
  • 11 February

    FinStealer Malware Targets Indian Bank’s Mobile Users, Stealing Credentials

    CYFIRMA

    CYFIRMA analysis reveals a sophisticated malware campaign that exploits a major Indian bank’s brand through fake mobile apps. These apps, distributed via phishing links and social engineering, closely resemble the real bank apps, deceiving users into sharing their credentials and personal information. The malware uses advanced techniques, such as encrypted …

    Read More »
  • 11 February

    CVE-2024-52875
    Over 12,000 Firewall Vulnerable to 1-Click RCE Exploit

    12,000 Firewall

    Over 1,200 firewall instances are vulnerable to a critical remote code execution issue, known as CVE-2024-52875. The vulnerability is found in several unauthenticated web interface paths, including /nonauth/addCertException.cs, /nonauth/guestConfirm.cs, and /nonauth/expiration.cs. These pages do not adequately sanitize user input from the dest GET parameter, allowing attackers to inject line feed …

    Read More »
  • 11 February

    CVE-2025-24200
    Apple releases update of zero-day vuln exploited in the Wild

    zero-day

    Apple has issued emergency security updates to fix a zero-day vulnerability, CVE-2025-24200, which is being exploited in targeted attacks on iPhone and iPad users. The vulnerability lets attackers turn off USB Restricted Mode on a locked device, risking unauthorized access to sensitive data. Apple is aware that this issue may …

    Read More »
  • 10 February

    Zimbra Releases Updates for SQL Injection, XSS, and SSRF Vulns

    Zimbra

    Zimbra has released updates for its Collaboration software to fix critical security flaws that could lead to information disclosure if exploited. CVE-2025-25064 is a critical vulnerability with a CVSS score of 9.8. It is an SQL injection issue in the ZimbraSync Service SOAP endpoint, affecting versions before 10.0.12 and 10.1.4. …

    Read More »
  • 10 February

    CVE-2025-23369
    SAML Bypass Auth on GitHub Enterprise Servers to Login

    SAML

    A serious security vulnerability, CVE-2025-23369, has been found in GitHub Enterprise Server (GHES) that lets attackers bypass SAML authentication and impersonate user accounts. This vulnerability takes advantage of specific anomalies in the libxml2 library employed in SAML response validation, allowing unauthorized access to accounts, even those with administrative rights. The …

    Read More »
  • 8 February

    India to launch new domain name for banks to combat digital fraud

    domain

    India’s central bank to launch a special “.bank.in” domain for banks in April 2025 to fight digital payment fraud and enhance trust in online banking. The Reserve Bank of India announced that the Institute for Development and Research in Banking Technology (IDRBT) will exclusively manage the new “fin.in” domain for …

    Read More »
  • 8 February

    Using 2.8 millions IPs, massive brute attack ongoing

    2.8 million

    The Shadowserver Foundation reports that a brute force attack has been active since last month, using nearly 2.8 million IP addresses each day attempting to guess the credentials for a wide range of networking devices. A brute force attack occurs when attackers repeatedly try different usernames and passwords to access …

    Read More »
  • 8 February

    The Surge and Consequences of Romance Scams in 2024

    Romance Scams

    Romance scams involve scammers creating fake profiles on online platforms to deceive people seeking love. They use attractive photos and pretend to have trustworthy jobs, like aid workers or military personnel, to attract victims. Scammers create elaborate lies to gain victims’ trust after meeting on social media, dating sites, or …

    Read More »