Articles tagged with: #zero-day Clear filter
Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

Cyber Security News cybersecuritynews.com

The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with Warlock ransomware began exploiting a critical zero-day vulnerability in Microsoft SharePoint. Discovered on July 19, 2025, the ToolShell vulnerability, tracked as CVE-2025-53770, became a primary vector for deploying the notorious Warlock ransomware across multiple organizations globally. This exploitation marked a

Hackers Exploited 73 0-Day Vulnerabilities and Earned $1,024,750

Hackers Exploited 73 0-Day Vulnerabilities and Earned $1,024,750

Cyber Security News cybersecuritynews.com

The hacking community celebrated the end of Pwn2Own Ireland 2025. Researchers demonstrated their skills by identifying 73 unique zero-day vulnerabilities across different devices. The event, hosted by the Zero Day Initiative (ZDI), distributed a staggering $1,024,750 in prizes, highlighting the growing sophistication of cybersecurity threats and defenses. Over three days, 56 bugs were rewarded before

Bitter APT Hackers Exploit WinRAR Zero-Day Via Weaponized Word Documents to Steal Sensitive Data

Bitter APT Hackers Exploit WinRAR Zero-Day Via Weaponized Word Documents to Steal Sensitive Data

Cyber Security News cybersecuritynews.com

The Bitter APT group, also tracked as APT-Q-37 and known in China as 蔓灵花, has launched a sophisticated cyberespionage campaign targeting government agencies, military installations, and critical infrastructure across China and Pakistan. The threat actor has deployed weaponized Microsoft Office documents that exploit a previously unknown zero-day vulnerability in WinRAR archive software to install custom

Cyberattack Detection in Critical Infrastructure and Supply Chains

Cyberattack Detection in Critical Infrastructure and Supply Chains

cs.CR updates on arXiv.org arxiv.org

arXiv:2510.19859v1 Announce Type: new Abstract: Cyberattack detection in Critical Infrastructure and Supply Chains has become challenging in Industry 4.0. Intrusion Detection Systems (IDS) are deployed to counter the cyberattacks. However, an IDS effectively detects attacks based on the known signatures and patterns, Zero-day attacks go undetected. To overcome this drawback in IDS, the integration of a Dense Neural Network (DNN) with Data Augmentation is proposed. It makes IDS intelligent and...

Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations

Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations

Cyber Security News cybersecuritynews.com

Salt Typhoon, a China-linked advanced persistent threat (APT) group active since 2019, has emerged as one of the most sophisticated cyber espionage operations targeting global critical infrastructure. Also tracked as Earth Estries, GhostEmperor, and UNC2286, the group has conducted high-impact campaigns against telecommunications providers, energy networks, and government systems across more than 80 countries. The

Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location

Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location

Cyber Security News cybersecuritynews.com

At Pwn2Own Ireland 2025, cybersecurity researchers Ben R. and Georgi G. from Interrupt Labs showcased an impressive achievement by successfully exploiting a zero-day vulnerability in the Samsung Galaxy S25. This allowed them to gain full control over the device, enabling them to activate the camera and track the user's location. The exploit, revealed on the

InfoSec News Nuggets 10/22/2025

InfoSec News Nuggets 10/22/2025

AboutDFIR – The Definitive Compendium Project aboutdfir.com

Hackers exploit 34 zero-days on first day of Pwn2Own Ireland On the first day of Pwn2Own Ireland 2025, security researchers exploited 34 unique zero-days and collected $522,500 in cash awards. The highlight of the day was Bongeun Koo and Evangelos Daravigkas of Team DDOS chaining eight zero-day flaws to hack the QNAP Qhora-322 Ethernet wireless router via the

Hackers Exploited 34 Zero-Day Vulnerabilities And Earned $522,500 In Pwn2Own Ireland 2025

Hackers Exploited 34 Zero-Day Vulnerabilities And Earned $522,500 In Pwn2Own Ireland 2025

Cyber Security News cybersecuritynews.com

The first day of Pwn2Own Ireland 2025 wrapped up with a bang, as security researchers uncovered 34 unique zero-day vulnerabilities across various smart devices. Not a single attempt failed, leading to a total payout of $522,500 in prizes. This event, held in Cork, Ireland, from October 21 to 24, brings together top hackers to test

Network security devices endanger orgs with '90s era flaws

Network security devices endanger orgs with '90s era flaws

cybersecurity www.reddit.com

Built to defend enterprise networks, network edge security devices are becoming liabilities, with an alarming rise in zero-day exploits of what experts describe as basic vulnerabilities, writes CSO's Lucian Constantin in a report on the state of the security product industry. 'Attackers constantly evolve their techniques. Security engineering, inherently challenging, can't fix everything. All software products have vulnerabilities, even security tools. These would be valid responses if we were...

Improving Intrusion Detection with Domain-Invariant Representation Learning in Latent Space

Improving Intrusion Detection with Domain-Invariant Representation Learning in Latent Space

cs.CR updates on arXiv.org arxiv.org

arXiv:2312.17300v5 Announce Type: replace Abstract: Zero-day anomaly detection is critical in industrial applications where novel, unforeseen threats can compromise system integrity and safety. Traditional detection systems often fail to identify these unseen anomalies due to their reliance on in-distribution data. Domain generalization addresses this gap by leveraging knowledge from multiple known domains to detect out-of-distribution events. In this work, we introduce a multi-task...

Chrome Zero-Day (CVE-2025-10585) : drive-by exploit hitting users

Chrome Zero-Day (CVE-2025-10585) : drive-by exploit hitting users

cybersecurity www.reddit.com

Google just patched another Chrome zero-day that's being actively exploited (CVE-2025-10585). It's a type-confusion bug in the V8 JavaScript engine , and yeah... it's already out in the wild. I can summarize it as below: Exploit triggers just by visiting a malicious site (no clicks needed). Works on Chrome before 140.0.7339.185/.186 (Win/Mac/Linux). Also affects other Chromium browsers (Edge, Brave, Opera, etc.). How to fix: Update Chrome to v140.0.7339.185+ right now. Check that auto-updates...

PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution

PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution

Cyber Security News cybersecuritynews.com

A proof-of-concept exploit for two critical vulnerabilities in the popular file archiver 7-Zip, potentially allowing attackers to execute arbitrary code remotely through malicious ZIP files. The flaws, tracked as CVE-2025-11001 and CVE-2025-11002, were disclosed by the Zero Day Initiative (ZDI) on October 7, 2025, and stem from improper handling of symbolic links during ZIP extraction

InfoSec News Nuggets 10/17/2025

InfoSec News Nuggets 10/17/2025

AboutDFIR – The Definitive Compendium Project aboutdfir.com

Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities U.S. Senator Bill Cassidy, Chairman of the Senate Health, Education, Labor, and Pensions (HELP) Committee, has demanded answers from Cisco Systems regarding recent zero-day vulnerabilities in its widely used networking equipment. The October 10, 2025, letter to CEO Chuck Robbins highlights the potential risks to national security and the

Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities

Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities

Cyber Security News cybersecuritynews.com

U.S. Senator Bill Cassidy, Chairman of the Senate Health, Education, Labor, and Pensions (HELP) Committee, has demanded answers from Cisco Systems regarding recent zero-day vulnerabilities in its widely used networking equipment. The October 10, 2025, letter to CEO Chuck Robbins highlights the potential risks to national security and the economy, following a swift emergency directive

Windows Agere Modem Driver 0-Day Vulnerabilities Actively Exploited To Escalate Privileges

Windows Agere Modem Driver 0-Day Vulnerabilities Actively Exploited To Escalate Privileges

Cyber Security News cybersecuritynews.com

Microsoft has disclosed two critical zero-day vulnerabilities in the Agere Modem driver bundled with Windows operating systems, confirming active exploitation to escalate privileges. The flaws, tracked as CVE-2025-24990 and CVE-2025-24052, affect the ltmdm64.sys driver and could allow low-privileged attackers to gain full administrator access. These issues were patched in the October 2025 cumulative update, but

Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks

Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks

Cyber Security News cybersecuritynews.com

Microsoft has confirmed active exploitation of a critical zero-day vulnerability in the Windows Remote Access Connection Manager (RasMan) service, allowing attackers to escalate privileges and potentially compromise entire systems. Tracked as CVE-2025-59230, the flaw stems from improper access control, enabling low-privileged users to gain SYSTEM-level access. Disclosed on October 14, 2025, the vulnerability affects multiple