Articles trouves pour le mardi 08 juillet 2025 |
---|
Piratage de Ingram Micro : la nouvelle victime du ransomware SafePay !07/07/2025
Ingram Micro, spécialisé dans les produits informatique et mondialement connu, a été victime d'une attaque par ransomware orchestrée par le groupe SafePay ! The post Piratage de Ingram Micro : la nouvelle victime du ransomware SafePay ! first appeared on IT-Connect. |
Linux #8211; Obtenez un accès root avec ces deux failles dans sudo : CVE-2025-32462 et CVE-2025-3246304/07/2025
Deux nouvelles failles découvertes dans sudo menace la sécurité des machines Linux (et macOS) : CVE-2025-32462 et CVE-2025-32463. Voici comment se protéger. The post Linux – Obtenez un accès root avec ces deux failles dans sudo : CVE-2025-32462 et CVE-2025-32463 first appeared on IT-Connect. |
How to Secure Your Promo Codes Against Cyber Exploits07/07/2025
Promo codes provide a fantastic opportunity to increase customer traffic and generate sales, yet there is a potential risk with them. Promo codes are one of the objects of interest to cybercriminals because they exploit those codes and use them to their personal advantage, which can cost your company its customers. Among the most popular [#8230;] The post How to Secure Your Promo Codes Against Cyber Exploits appeared first on IT Security Guru. |
Ransomware Attacks Spike Despite Gang Closure04/07/2025
New research from Comparitech revealed that in the first half of 2025, 3,627 ransomware attacks were reported and logged. This is a 47% increase since the first half of 2024, which is highly concerning for major organisations due to the frequency of these attacks. However, popular ransomware groups, like Hunter international and Lockbit, have closed [#8230;] The post Ransomware Attacks Spike Despite Gang Closure appeared first on IT Security Guru. |
Le logiciel de sécurité des frontières de l'Union européenne serait truffé de failles de sécurité, le SIS II développé et géré par Sopra Steria serait vulnérable aux cyberattaques, d'après un rapport07/07/2025
Le logiciel de sécurité des frontières de l'Union européenne serait truffé de failles de sécurité, le SIS II développé et géré par Sopra Steria serait vulnérable aux cyberattaques, d'après un rapport |
ZDI-25-482: (0Day) INVT VT-Designer PM3 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability07/07/2025 This vulnerability allows remote attackers to execute arbitrary code on affected installations of INVT VT-Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-7231. |
ZDI-25-481: (0Day) INVT VT-Designer PM3 File Parsing Type Confusion Remote Code Execution Vulnerability07/07/2025 This vulnerability allows remote attackers to execute arbitrary code on affected installations of INVT VT-Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-7230. |
ZDI-25-480: (0Day) INVT VT-Designer PM3 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability07/07/2025 This vulnerability allows remote attackers to execute arbitrary code on affected installations of INVT VT-Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-7229. |
ZDI-25-479: (0Day) INVT VT-Designer PM3 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability07/07/2025 This vulnerability allows remote attackers to execute arbitrary code on affected installations of INVT VT-Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-7228. |
ZDI-25-478: (0Day) INVT VT-Designer PM3 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability07/07/2025 This vulnerability allows remote attackers to execute arbitrary code on affected installations of INVT VT-Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-7227. |
ZDI-25-477: (0Day) INVT HMITool VPM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability07/07/2025 This vulnerability allows remote attackers to execute arbitrary code on affected installations of INVT HMITool. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-7226. |
ZDI-25-476: (0Day) INVT HMITool VPM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability07/07/2025 This vulnerability allows remote attackers to execute arbitrary code on affected installations of INVT HMITool. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-7225. |
ZDI-25-475: (0Day) INVT HMITool VPM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability07/07/2025 This vulnerability allows remote attackers to execute arbitrary code on affected installations of INVT HMITool. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-7224. |
ZDI-25-474: (0Day) INVT HMITool VPM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability07/07/2025 This vulnerability allows remote attackers to execute arbitrary code on affected installations of INVT HMITool. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-7223. |
ZDI-25-473: Parallels Client Uncontrolled Search Path Element Local Privilege Escalation Vulnerability07/07/2025 This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Client. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2025-6812. |
Multiples vulnérabilités dans les produits IBM (04 juillet 2025)04/07/2025 De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données. |
Multiples vulnérabilités dans le noyau Linux d'Ubuntu (04 juillet 2025)04/07/2025 De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données. |
Multiples vulnérabilités dans le noyau Linux de SUSE (04 juillet 2025)04/07/2025 De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données. |
Multiples vulnérabilités dans le noyau Linux de Red Hat (04 juillet 2025)04/07/2025 De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données. |
Multiples vulnérabilités dans PHP (04 juillet 2025)04/07/2025 De multiples vulnérabilités ont été découvertes dans PHP. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une injection SQL (SQLi) et une falsification de requêtes côté serveur (SSRF). L'éditeur a connaissance de preuves de concept pour les... |
Technical difficulties or cyber attack? Ingram Micro’s website goes down just in time for the holiday weekend04/07/2025 Nothing says "Holiday Weekend" like a mysterious IT outage. |
Hunters International ransomware group shuts down #8211; but will it regroup under a new guise?04/07/2025 The notorious Hunters International ransomware-as-a-service operation has announced that it has shut down, in a message posted on its dark web leak site. In a statement on its extortion site, the ransomware group says that it has not only "decided to close the Hunters International project" but is also offering free decryption tools to its previous victims - with no ransom payment required. Read more in my article on the Hot for Security blog. |
Friday Squid Blogging: How Squid Skin Distorts Light04/07/2025
New research. As usual, you can also use this squid post to talk about the security stories in the news that I haven#8217;t covered. |