High-severity WinRAR 0-day exploited for weeks by 2 groups

Exploits allow for persistent backdooring when targets open booby-trapped archive.

Ars Technica
CISA Catalog of Known Exploited Vulnerabilities
Choose your products that to compare to current CVEs. The list is generated from current CVEs. Download them or create a custom GRC plan.
https://blackcatwhitehatsecurity.com/cveProducts.cfm
#CISA #Catalog #Known #Exploited #Vulnerabilities #technology

#Microsoft Fix Targets Attacks on #SharePoint #ZeroDay

Microsoft Corp. issued an emergency #security update for a #vulnerability in SharePoint Server that is actively being #exploited to compromise #vulnerable organizations. The #patch comes amid reports that malicious #hackers have used the SharePoint flaw to #breach U.S. federal and state agencies, universities, and energy companies.
#privacy

https://krebsonsecurity.com/2025/07/microsoft-fix-targets-attacks-on-sharepoint-zero-day/

Microsoft Fix Targets Attacks on SharePoint Zero-Day – Krebs on Security

Microsoft Teams Exploited to Deliver Matanbuchus Ransomware Payload

A sophisticated cyberattack campaign has emerged targeting organizations through Microsoft Teams impersonation.

GBHackers Security | #1 Globally Trusted Cyber Security News Platform
L'abbiamo sempre saputo...

The Exploited - Fuck The USA - 1982

#music #punk #exploited #hc #hardcore #theexploited

https://inv.nadeko.net/watch?v=FZg8yjr9cBE

Critical #CitrixBleed 2 #vulnerability has been under active #exploit for weeks

A critical vulnerability allowing #hackers to bypass #multifactor #authentication in network management devices made by #Citrix has been actively #exploited for more than a month, researchers said. The finding is at odds with advisories from the vendor saying there is no evidence of in-the-wild #exploitation.
#security #privacy

https://arstechnica.com/security/2025/07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/

Critical CitrixBleed 2 vulnerability has been under active exploit for weeks

Exploits allow hackers to bypass 2FA and commandeer vulnerable devices.

Ars Technica

#PerfektBlue #Bluetooth #Vulnerabilities Expose Millions of #Vehicles to Remote Code Execution

"Cybersecurity researchers have discovered a set of four security flaws in OpenSynergy's BlueSDK Bluetooth stack that, if successfully #exploited, could allow remote code execution #rce on millions of #transport vehicles from different vendors."
https://thehackernews.com/2025/07/perfektblue-bluetooth-vulnerabilities.html

PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution

Researchers uncover PerfektBlue flaws in OpenSynergy’s BlueSDK, exposing millions of vehicles to remote code execution

The Hacker News

Actively #exploited #vulnerability gives extraordinary control over #server fleets

The vulnerability, carrying a #severity rating of 10 out of a possible 10, resides in the #AMIMegaRAC , a widely used #firmware package that allows large fleets of servers to be remotely accessed and managed even when power is unavailable or the operating system isn't functioning.
#security #ami #megarac

https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/

Actively exploited vulnerability gives extraordinary control over server fleets

AMI MegaRAC used in servers from AMD, ARM, Fujitsu, Gigabyte, Supermicro, and Qualcomm.

Ars Technica
CISA Catalog of Known Exploited Vulnerabilities
Choose your products that to compare to current CVEs. The list is generated from current CVEs. Download them or create a custom GRC plan.
https://blackcatwhitehatsecurity.com/cveProducts.cfm
#CISA #Catalog #Known #Exploited #Vulnerabilities #technology
CISA Catalog of Known Exploited Vulnerabilities
Choose your products that you use to compare to current CVEs. Product list is generated from current CVEs. Download the vulnerabilities or create a custom GRC plan.
https://blackcatwhitehatsecurity.com/cveProducts.cfm
#CISA #Catalog #Known #Exploited #Vulnerabilities #technology