Trend Micro has just closed the door on critical flaws that could’ve let hackers run code in your security setup. Are you up to date with the latest patch fixes?

https://thedefendopsdiaries.com/trend-micro-addresses-critical-vulnerabilities-in-apex-central-and-endpoint-encryption-policyserver/

#trendmicro
#cybersecurity
#vulnerability
#patchmanagement
#remotecodeexecution

.NET and .NET Framework June 2025 servicing releases updates - .NET Blog

A recap of the latest servicing updates for .NET and .NET Framework for June 2025.

.NET Blog

Critical Wazuh RCE Vulnerability Exploited by Mirai Botnets

A critical remote code execution (RCE) vulnerability has been exploited in
Wazuh servers by multiple Mirai-based botnets. This vulnerability tracked as
CVE-2025-24016 with a CVSS score of 9.9.

Pulse ID: 68473b944bd71da7500aaa68
Pulse Link: https://otx.alienvault.com/pulse/68473b944bd71da7500aaa68
Pulse Author: cryptocti
Created: 2025-06-09 19:52:52

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #Mirai #OTX #OpenThreatExchange #RCE #RemoteCodeExecution #Vulnerability #bot #botnet #cryptocti

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
Critical Remote Code Execution : Vulnerability Exposes Thousands of GeoServer Instances | WardenShield

Cybersecurity researchers have discovered over 6,600 GeoServer instances exposed online, vulnerable to critical Remote Code Execution (RCE) attacks. This flaw, caused by improper input validation of XML data, allows attackers to execute arbitrary code on affected servers, posing significant risks to data security and service continuity. Immediate patching and security updates are recommended to mitigate these threats.

WardenShield

The Sharp Taste of Mimo'lette: Analyzing Mimo's Latest Campaign targeting Craft CMS

Between February and May, multiple exploitations of CVE-2025-32432, a Remote Code Execution vulnerability in Craft CMS, were observed. The attack chain involves deploying a webshell, downloading an infection script, and executing malicious payloads including a loader, crypto miner, and residential proxyware. The Mimo intrusion set is believed responsible, using distinctive identifiers like '4l4md4r' and 'n1tr0'. The group deploys XMRig for cryptomining and IPRoyal for bandwidth monetization. Two potential operators, 'EtxArny' and 'N1tr0', were identified through social media analysis. While showing interest in Middle Eastern affairs, the group's primary motivation appears financial. Detection opportunities include monitoring for unusual processes in temporary directories and kernel module alterations.

Pulse ID: 68360c3f4169ef29b7c93f6f
Pulse Link: https://otx.alienvault.com/pulse/68360c3f4169ef29b7c93f6f
Pulse Author: AlienVault
Created: 2025-05-27 19:02:23

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CryptoMining #CyberSecurity #InfoSec #MiddleEast #Mimo #OTX #OpenThreatExchange #Proxy #RAT #RemoteCodeExecution #SocialMedia #Vulnerability #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Chinese hackers are exploiting critical Ivanti EPMM flaws to bypass security and execute remote code—targeting everything from healthcare to government agencies. Are your defenses ready for this level of stealth?

https://thedefendopsdiaries.com/exploitation-of-ivanti-epmm-vulnerabilities-by-chinese-hackers-a-detailed-analysis/

#ivanti
#cybersecurity
#chinesehackers
#vulnerability
#remotecodeexecution

Versa Concerto 0-Day Flaw Enables Remote Code Execution by Bypassing Authentication

Security researchers have uncovered multiple critical vulnerabilities in Versa Concerto, a widely deployed network security and SD-WAN orchestration platform.

GBHackers Security | #1 Globally Trusted Cyber Security News Platform

China-Nexus Threat Actor Actively Exploiting Ivanti Endpoint Manager Mobile (CVE-2025-4428) Vulnerability

A critical vulnerability in Ivanti Endpoint Manager Mobile (EPMM) is being actively exploited by a China-nexus threat actor, UNC5221. The exploitation targets internet-facing EPMM deployments across various sectors including healthcare, telecommunications, and government. The attackers utilize unauthenticated remote code execution to gain initial access, followed by the deployment of KrustyLoader malware for persistence. They leverage hardcoded MySQL credentials to exfiltrate sensitive data from the EPMM database. The threat actor also uses the Fast Reverse Proxy (FRP) tool for network reconnaissance and lateral movement. The compromised systems span multiple countries in Europe, North America, and Asia-Pacific, indicating a global espionage campaign likely aligned with Chinese state interests.

Pulse ID: 682e5bbc1075b03f94642762
Pulse Link: https://otx.alienvault.com/pulse/682e5bbc1075b03f94642762
Pulse Author: AlienVault
Created: 2025-05-21 23:03:24

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Asia #China #Chinese #CyberSecurity #Endpoint #Espionage #Europe #FastReverseProxy #Government #Healthcare #InfoSec #Ivanti #Malware #MySQL #NorthAmerica #OTX #OpenThreatExchange #Proxy #RAT #RemoteCodeExecution #ReverseProxy #Rust #SQL #Telecom #Telecommunication #Vulnerability #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

One-Click RCE in ASUS’s Preinstalled Driver Software

ASUS DriverHub's improper origin validation allows RCE via crafted domains and malicious INI files, enabling silent admin-level code execution.

https://mrbruh.com/asusdriverhub/

#ASUSDriver #RemoteCodeExecution

One-Click RCE in ASUS's Preinstalled Driver Software

One-Click RCE in ASUS’s Preinstalled Driver Software Part Two of this series on ASUS will be dropping by the end of (this) month (06), yes it somehow manages to get worse (Everyone who made an ASUS account may have their personal info exposed). Hi Low Level Fellas, Hope you enjoy my blog, there are a bunch more you can read on my homepage. I also have RSS and a new blog on the way so stay tuned!

Multiple Ivanti Endpoint Mobile Manager Vulnerabilities Allows Remote Code Execution

Critical security flaws have been uncovered in Ivanti EPMM, a widely used MDM solution, exposing organization to the risk.

Cyber Security News