Luca Donetti Dontin Il sito di un pazzo sistemista! - page 14

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.  CVE-2025-8875 N-able N-central Insecure Deserialization Vulnerability CVE-2025-8876 N-able N-central Command Injection Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant…

Continue reading →

Should Security Solutions Be Secure? Maybe We're All Wrong – Fortinet FortiSIEM Pre-Auth Command Injection (CVE-2025-25256)

Should Security Solutions Be Secure? Maybe We're All Wrong – Fortinet FortiSIEM Pre-Auth Command Injection (CVE-2025-25256)

It’s Friday, but we’re here today with unscheduled content – pushing our previously scheduled shenanigans to next week. Fortinet is no stranger to the watchTowr Labs research team. Today we’re looking at CVE-2025-25256 – a pre-authentication command injection in FortiSIEM that lets an attacker compromise…

Continue reading →

CISA Releases Thirty-Two Industrial Control Systems Advisories

CISA released thirty-two Industrial Control Systems (ICS) advisories on August 14, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-226-01 Siemens SIMATIC RTLS Locating Manager ICSA-25-226-02 Siemens COMOS ICSA-25-226-03 Siemens Engineering Platforms ICSA-25-226-04 Siemens Simcenter Femap ICSA-25-226-05 Siemens Wibu CodeMeter Runtime ICSA-25-226-06 Siemens Opcenter…

Continue reading →

CISA and Partners Release Asset Inventory Guidance for Operational Technology Owners and Operators

CISA, along with the National Security Agency, the Federal Bureau of Investigation, Environmental Protection Agency, and several international partners, released comprehensive guidance to help operational technology (OT) owners and operators across all critical infrastructure sectors create and maintain OT asset inventories and supplemental taxonomies.  An…

Continue reading →

ICMP ‘Destination Unreachable’ Messages @ SharkFest’24 EU

I did a presentation at Sharkfest’24 Eu in Vienna, the “Wireshark Developer and User Conference“, about the topic: “Unveiling Network Errors – A Deep Dive into ICMP ‘Destination Unreachable’ Messages“. It covers the following: “Effective troubleshooting of network issues is a critical concern… Source link…

Continue reading →

5 Common Cloud Security Gaps and How Lacework FortiCNAPP Can Close Them

Learn how Fortinet’s CNAPP addresses the top cloud security gaps by unifying posture management, runtime protection, CDR, and application-layer defense to reduce risk across hybrid and multi-cloud environments. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

From ClickFix to Command: A Full PowerShell Attack Chain

A regionally targeted PowerShell-based campaign used phishing lures, obfuscation, and RAT delivery to infiltrate Israeli organizations. Learn how the attack chain worked—and how Fortinet blocked it. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

CISA Releases Malware Analysis Report Associated with Microsoft SharePoint Vulnerabilities

CISA published a Malware Analysis Report (MAR) with analysis and associated detection signatures on files related to Microsoft SharePoint vulnerabilities: CVE-2025-49704 [CWE-94: Code Injection], CVE-2025-49706 [CWE-287: Improper Authentication], CVE-2025-53770 [CWE-502: Deserialization of Untrusted Data], and CVE-2025-53771 [CWE-287: Improper Authentication] Cyber threat actors have chained CVE-2025-49704…

Continue reading →

Page 14 of 189 ← First ... 12 13 14 15 16 ... Last →