Aggregator
Trend Micro Apex One flaws exploted in the wild (CVE-2025-54948, CVE-2025-54987)
Unauthenticated command injection vulnerabilities (CVE-2025-54948, CVE-2025-54987) affecting the on-premise version of Trend Micro’s Apex One endpoint security platform are being probed by attackers, the company has warned on Wednesday. Unfortunately for those organizations that use it, a patch is still in the works and is expected to be released around the middle of August 2025. But the company has provided a “fix tool” that mitigates the risk of exploitation in the short term – though … More →
The post Trend Micro Apex One flaws exploted in the wild (CVE-2025-54948, CVE-2025-54987) appeared first on Help Net Security.
Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks
Security researchers have identified a sophisticated new tactic employed by Akira ransomware operators, who are exploiting legitimate Windows drivers to evade antivirus and endpoint detection systems while targeting SonicWall VPN infrastructure. This development represents a significant escalation in the group’s technical capabilities and poses serious challenges for enterprise cybersecurity defenses. Campaign Overview and Timeline From […]
The post Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks
A sophisticated evasion technique employed by Akira ransomware affiliates, exploiting legitimate Windows drivers to bypass antivirus and endpoint detection and response (EDR) systems during recent SonicWall VPN attack campaigns. The attacks, which have escalated from late July through early August 2025, demonstrate the threat actors’ evolving tactics to maintain persistence and avoid detection in compromised […]
The post Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks appeared first on Cyber Security News.
CVE-2025-46389 | Emby MediaBrowser 4.9.0.35 unverified password change
CVE-2025-46388 | Emby MediaBrowser 4.9.0.35 information disclosure
CVE-2025-46387 | Emby MediaBrowser 4.9.0.35 authorization
CVE-2025-46390 | Emby MediaBrowser 4.9.0.35 observable response discrepancy
CVE-2025-46391 | Emby MediaBrowser 4.9.0.35 access control
CVE-2025-7202 | Elgato Key Light up to 1.0.3(218) cross-site request forgery
CVE-2025-46386 | Emby MediaBrowser 4.9.0.35 authorization
CVE-2025-7771 | TechPowerUp ThrottleStop 3.0.0.0 IOCTL Interface ThrottleStop.sys MmMapIoSpace exposed ioctl with insufficient access control (erUp-2025-001)
CVE-2025-22469 | SATO CL4-6NX Plus/CL4-6NX-J Plus prior 1.15.5-r1 os command injection (EUVD-2025-23819)
CVE-2025-22470 | SATO CL4-6NX Plus/CL4-6NX-J Plus prior 1.15.5-r1 Lua Script unrestricted upload (EUVD-2025-23818)
CVE-2025-6013 | HashiCorp Vault/Vault Enterprise up to 1.20.1 LDAP Auth Method whitespace (WID-SEC-2025-1730)
ControlVault должен был защищать Dell. Теперь он помогает прятать бэкдор
Descope enhances AI identity security with Agentic Identity Control Plane
Descope launched Agentic Identity Control Plane, a solution that enables security teams to institute policy-based governance, auditing, and identity management for their AI agent and Model Context Protocol (MCP) ecosystems. The Agentic Identity Control Plane builds on top of the existing Descope Agentic Identity Hub to mark a huge step forward in Descope’s vision of becoming the identity provider for AI agents. As AI agents, LLMs, and MCP servers continue gaining rapid adoption, security leaders … More →
The post Descope enhances AI identity security with Agentic Identity Control Plane appeared first on Help Net Security.