Cyber Security

Cyber Security
Cyber Security

Jenkins Patches Multiple Vulnerabilities that Allow Attackers to Cause a Denial of Service

jenkins-patches-multiple-vulnerabilities-that-allow-attackers-to-cause-a-denial-of-service

Jenkins has released critical updates addressing four security flaws that unauthenticated and low-privileged attackers could exploit to disrupt service or glean sensitive configuration details.  Administrators running Jenkins weekly releases up to 2.527 or the Long-Term Support (LTS) stream up to 2.516.2 must upgrade to mitigate these risks. HTTP/2 Denial of Service (CVE-2025-5115) A high-severity issue […]

Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network

pixie-dust-wi-fi-attack-exploits-routers-wps-to-obtain-pin-and-connect-with-wireless-network

The newly publicized Pixie Dust attack has once again exposed the critical vulnerabilities inherent in the Wi-Fi Protected Setup (WPS) protocol, enabling attackers to extract the router’s WPS PIN offline and seamlessly join the wireless network.  By targeting weak randomization in the registrar’s nonces, this exploit subverts the intended security of WPS without requiring proximity […]

FinWise Insider Breach Exposes 700K Customer Records to Former Employee

finwise-insider-breach-exposes-700k-customer-records-to-former-employee

American First Finance, LLC, a Dallas-based financial services firm, suffered a significant insider breach when a recently terminated employee exploited unauthorized access to its production database.  The incident, dubbed the FinWise insider breach, resulted in the exfiltration of sensitive customer records nearly 689,000 names, Social Security numbers, and other personal identifiers via direct SQL queries […]

Hackers Can Exploit Bitpixie Vulnerability to Bypass BitLocker Encryption and Escalate Privileges

hackers-can-exploit-bitpixie-vulnerability-to-bypass-bitlocker-encryption-and-escalate-privileges

A critical vulnerability in Windows Boot Manager, known as bitpixie, enables attackers to bypass BitLocker drive encryption and escalate local privileges on Windows systems.  The vulnerability affects boot managers from 2005 to 2022 and can still be exploited on updated systems through downgrade attacks, posing significant risks to enterprise security. Key Takeaways1. Bitpixie lets attackers bypass BitLocker […]

New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips

new-phoenix-rowhammer-attack-variant-bypasses-protection-with-ddr5-chips

A new Rowhammer attack variant named Phoenix can bypass the latest protections in modern DDR5 memory chips, researchers have revealed. The attack is the first to demonstrate a practical privilege escalation exploit on a commodity system equipped with DDR5 RAM, undermining the assumption that these newer memory modules were immune to such threats. Rowhammer is […]

Massive Supply Chain Attack Hijacks ctrl/tinycolor With 2 Million Downloads and Other 40 NPM Packages

massive-supply-chain-attack-hijacks-ctrl/tinycolor-with-2-million-downloads-and-other-40-npm-packages

A sophisticated and widespread supply chain attack has struck the NPM ecosystem, compromising the popular @ctrl/tinycolor package, which is downloaded over 2 million times per week. The attack also affected more than 40 other packages from various maintainers, introducing a dangerous self-propagating malware designed to steal developer credentials and spread itself across the software landscape. […]

Sidewinder APT Hackers Leverage Nepal Protests to Push Mobile and Windows Malware

sidewinder-apt-hackers-leverage-nepal-protests-to-push-mobile-and-windows-malware

The eruption of widespread protests across Nepal in early September 2025 provided fertile ground for a sophisticated campaign orchestrated by the Sidewinder APT group. As demonstrators mobilized against government policies and social media restrictions, threat actors exploited the turbulence to distribute malicious applications masquerading as legitimate emergency services. Victims seeking live updates or assistance were […]

Progress OpenEdge AdminServer Vulnerability Let Attackers Execute Remote Code

progress-openedge-adminserver-vulnerability-let-attackers-execute-remote-code

A critical security vulnerability has been discovered in Progress OpenEdge, a platform for developing and deploying business applications. The flaw, identified as CVE-2025-7388, allows for remote code execution (RCE) and affects multiple versions of the software, potentially enabling attackers to execute arbitrary commands with elevated system privileges. The vulnerability resides in the AdminServer component of […]

Windows Defender Vulnerability Allows Service Hijacking and Disablement via Symbolic Link Attack

windows-defender-vulnerability-allows-service-hijacking-and-disablement-via-symbolic-link-attack

A severe vulnerability in Windows Defender’s update process allows attackers with administrator privileges to disable the security service and manipulate its core files. The technique, which leverages a flaw in how Defender selects its execution folder, can be carried out using tools already available on the Windows operating system. The vulnerability was detailed by Zero […]

Venezuelas Maduro Says Huawei Mate X6 Gift From China is Unhackable by U.S. Spies

venezuelas-maduro-says-huawei-mate-x6-gift-from-china-is-unhackable-by-us.-spies

In Caracas this week, President Nicolás Maduro unveiled the Huawei Mate X6 gifted by China’s Xi Jinping, declaring the device impervious to U.S. espionage efforts. The announcement coincides with heightened tensions between Washington and Beijing, as the United States enforces stringent controls on Chinese telecom equipment. Beyond its political symbolism, the Mate X6 has become […]