cybersecurity

4704 readers
3 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
276
277
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

278
279
 
 

Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!

280
281
3
Off-Topic Friday (self.cybersecurity)
submitted 4 months ago by shellsharks to c/cybersecurity
 
 

Wanna chat about something non-infosec amongst those of us who frequent /c/cybersecurity? Here’s your chance! (Keep things civil & respectful please)

282
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

283
284
285
21
submitted 4 months ago* (last edited 4 months ago) by cm0002@lemmy.world to c/cybersecurity
 
 

A critical remote code execution (RCE) vulnerability in Apache Tomcat tracked as CVE-2025-24813 is actively exploited in the wild, enabling attackers to take over servers with a simple PUT request.

Hackers are reportedly leveraging proof-of-concept (PoC) exploits that were published on GitHub just 30 hours after the flaw was disclosed last week.

The malicious activity was confirmed by Wallarm security researchers, who warned that traditional security tools fail to detect it as PUT requests appear normal and the malicious content is obfuscated using base64 encoding.

286
287
6
submitted 4 months ago* (last edited 4 months ago) by tonytins@pawb.social to c/cybersecurity
288
4
mac.c macOS Stealer (cryptolek.info)
submitted 4 months ago by CryptoLek to c/cybersecurity
 
 

On 14 March 2025, a user “mentalpositive” on XSS Forum has posted a thread advertising a new MacOS infostealer. Below is the machine translation of the user’s forum post, with minor edits by me (I have copy-pasted just the intro, the rest on the blog, if interested):

spoilermac.c macOS Stealer is a stealer for devices running the macOS operating system. Works on all system versions starting from macOS Sierra (>10.12.6). Written in C, the build weight at the time of writing the topic is ~140 KB. Both architectures are supported: x64_86, ARM. Collect cookies, passwords, autofills and history from Chromium-based browsers, device information, Telegram session, desktop cryptocurrencies and cryptocurrencies, screenshot and decrypted device keychain. And the ability to change the text in modal windows when a password is requested will make your work even more pleasant!

289
290
 
 

The Danish Social Security Agency published a new threat assessment for the cyber threat to the telecommunications sector that highlights the risks for the telecom companies in Europe.

“In this threat assessment, the Danish Agency for Social Security raises the threat level for cyber espionage against the Danish telecommunications sector to HIGH. This is because the extent of cyber espionage against the telecommunications sector in Europe has likely increased.” reads the threat assessment. “Danish telecommunications and internet providers must therefore also be aware of attempted cyber attacks by state hackers.”

291
 
 

Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!

292
293
294
8
Off-Topic Friday (self.cybersecurity)
submitted 4 months ago by shellsharks to c/cybersecurity
 
 

Wanna chat about something non-infosec amongst those of us who frequent /c/cybersecurity? Here’s your chance! (Keep things civil & respectful please)

295
296
297
5
submitted 4 months ago* (last edited 4 months ago) by tonytins@pawb.social to c/cybersecurity
 
 

In a barebones advisory, Facebook warned that the security defect was found in FreeType versions 2.13.0 and below and provides a pathway for arbitrary code execution attacks.

“This vulnerability may have been exploited in the wild,” Facebook said, without providing any details on the reported attacks. The bug has been tagged as CVE-2025-27363 and carries a CVSS severity score of 8.1 out of 10.

298
1
submitted 4 months ago* (last edited 4 months ago) by tonytins@pawb.social to c/cybersecurity
 
 

Microsoft has released the KB5053606 cumulative update for Windows 10 22H2 and Windows 10 21H2, which fixes numerous bugs, including one preventing SSH connections.

The Windows 10 KB5053606 update is mandatory as it contains Microsoft's March 2025 Patch Tuesday security updates, which fix six actively exploited zero-day vulnerabilities.

299
300
view more: ‹ prev next ›