digicat@infosec.pubMEnglish · 7 days agoCTO at NCSC Summary: week ending December 21st - nearly Christmas edition ❄️🎄🎅🤶🎄❄️plus-squarepinctoatncsc.substack.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCTO at NCSC Summary: week ending December 21st - nearly Christmas edition ❄️🎄🎅🤶🎄❄️plus-squarepinctoatncsc.substack.comdigicat@infosec.pubMEnglish · 7 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 12 hours agoHP Aruba Privileged Escalation Dec 2025plus-squarethecontractor.ioexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHP Aruba Privileged Escalation Dec 2025plus-squarethecontractor.iodigicat@infosec.pubMEnglish · 12 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 21 hours agoSpearphishing Campaign Abuses npm Registry to Target U.S. and Allied Manufacturing and Healthcare Organizationsplus-squaresocket.devexternal-linkmessage-square0linkfedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkSpearphishing Campaign Abuses npm Registry to Target U.S. and Allied Manufacturing and Healthcare Organizationsplus-squaresocket.devdigicat@infosec.pubMEnglish · 21 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 21 hours agoCVE-2025-14847 - MongoDB Unauthenticated Memory Leak Exploit - A proof-of-concept exploit for the MongoDB zlib decompression vulnerability that allows unauthenticated attackers to leak sensitive serveplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkCVE-2025-14847 - MongoDB Unauthenticated Memory Leak Exploit - A proof-of-concept exploit for the MongoDB zlib decompression vulnerability that allows unauthenticated attackers to leak sensitive serveplus-squaregithub.comdigicat@infosec.pubMEnglish · 21 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 21 hours agoReviving Discarded Vulnerabilities: Exploiting Previously Unexploitable Linux Kernel Bugs Through Control Metadata Fieldslujie.ac.cnexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkReviving Discarded Vulnerabilities: Exploiting Previously Unexploitable Linux Kernel Bugs Through Control Metadata Fieldslujie.ac.cndigicat@infosec.pubMEnglish · 21 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 21 hours agoLangChain serialization injection vulnerability enables secret extraction in dumps/loads APIsplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkLangChain serialization injection vulnerability enables secret extraction in dumps/loads APIsplus-squaregithub.comdigicat@infosec.pubMEnglish · 21 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 21 hours agoCPLDCOMTrigger: CPL remote trigger - A Python script depends on Impacket scripts to trigger the loading of a .cpl file into memory using a DCOM object.plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkCPLDCOMTrigger: CPL remote trigger - A Python script depends on Impacket scripts to trigger the loading of a .cpl file into memory using a DCOM object.plus-squaregithub.comdigicat@infosec.pubMEnglish · 21 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 21 hours agoTRM Traces Stolen Crypto from 2022 LastPass Breach — On-chain Indicators Suggest Russian Cybercriminal Involvementplus-squarewww.trmlabs.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkTRM Traces Stolen Crypto from 2022 LastPass Breach — On-chain Indicators Suggest Russian Cybercriminal Involvementplus-squarewww.trmlabs.comdigicat@infosec.pubMEnglish · 21 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 21 hours agoEmEditor 供应链事件细节披露:分发窃密特马席卷国内政企 - Details of the EmEditor supply chain incident revealed: Distribution of stolen MITBBS tokens sweeps across domestic government and enterprises.mp.weixin.qq.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkEmEditor 供应链事件细节披露:分发窃密特马席卷国内政企 - Details of the EmEditor supply chain incident revealed: Distribution of stolen MITBBS tokens sweeps across domestic government and enterprises.mp.weixin.qq.comdigicat@infosec.pubMEnglish · 21 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 20 hours agoContinuously hardening ChatGPT Atlas against prompt injection attacks - "However, prompt injection remains an open challenge for agent security, and one we expect to continue working on for years"plus-squareopenai.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkContinuously hardening ChatGPT Atlas against prompt injection attacks - "However, prompt injection remains an open challenge for agent security, and one we expect to continue working on for years"plus-squareopenai.comdigicat@infosec.pubMEnglish · 20 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 20 hours agoRansomware cyber attack on Romanian Watersplus-squarewww.dnsc.roexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkRansomware cyber attack on Romanian Watersplus-squarewww.dnsc.rodigicat@infosec.pubMEnglish · 20 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 20 hours agoMapping “Fly”, a threat actor with links to Russian Market’s infrastructureplus-squarewww.intrinsec.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkMapping “Fly”, a threat actor with links to Russian Market’s infrastructureplus-squarewww.intrinsec.comdigicat@infosec.pubMEnglish · 20 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 20 hours agoAnnual Report to Congress: Military and Security Developments Involving the People's Republic of China 2025 - "Throughout 2024, PLA cyber actors almost certainly maintained and developed further"plus-squaremedia.defense.govexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkAnnual Report to Congress: Military and Security Developments Involving the People's Republic of China 2025 - "Throughout 2024, PLA cyber actors almost certainly maintained and developed further"plus-squaremedia.defense.govdigicat@infosec.pubMEnglish · 20 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 21 hours agoPCIe IDE Standard Vulnerabilities - Potential security vulnerabilities were found to be affecting PCIe Base Specification Revision 5.0 and onwards in a protocol mechanismplus-squarepcisig.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkPCIe IDE Standard Vulnerabilities - Potential security vulnerabilities were found to be affecting PCIe Base Specification Revision 5.0 and onwards in a protocol mechanismplus-squarepcisig.comdigicat@infosec.pubMEnglish · 21 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 1 day agoJustice Department Announces Seizure of Stolen-Password Database Used in Bank Account Takeover Fraudplus-squarewww.justice.govexternal-linkmessage-square1linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkJustice Department Announces Seizure of Stolen-Password Database Used in Bank Account Takeover Fraudplus-squarewww.justice.govdigicat@infosec.pubMEnglish · 1 day agomessage-square1linkfedilink
digicat@infosec.pubMEnglish · 2 days agoDumpChromeSecrets: Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and bookmarksplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkDumpChromeSecrets: Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and bookmarksplus-squaregithub.comdigicat@infosec.pubMEnglish · 2 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 1 day agoEvasive Panda APT campaign overviewplus-squaresecurelist.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkEvasive Panda APT campaign overviewplus-squaresecurelist.comdigicat@infosec.pubMEnglish · 1 day agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 1 day agoCybersecurity Staff Plead Guilty for Moonlighting as Hackersplus-squarewww.bloomberg.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkCybersecurity Staff Plead Guilty for Moonlighting as Hackersplus-squarewww.bloomberg.comdigicat@infosec.pubMEnglish · 1 day agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 1 day agoProduct Security Advisory and Analysis: Observed Abuse of FG-IR-19-283 | Fortinet Blogplus-squarewww.fortinet.comexternal-linkmessage-square1linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkProduct Security Advisory and Analysis: Observed Abuse of FG-IR-19-283 | Fortinet Blogplus-squarewww.fortinet.comdigicat@infosec.pubMEnglish · 1 day agomessage-square1linkfedilink
digicat@infosec.pubMEnglish · 1 day agoNew Cloud Atlas APT campaignplus-squaresecurelist.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkNew Cloud Atlas APT campaignplus-squaresecurelist.comdigicat@infosec.pubMEnglish · 1 day agomessage-square0linkfedilink