Sys-Admin InfoSec – Telegram
Sys-Admin InfoSec
12.7K subscribers
235 photos
2 videos
103 files
4.54K links
News of cybersecurity / information security, information technology, data leaks / breaches, cve, hacks, tools, trainings
* Multilingual (En, Ru).
* Forum - forum.sys-adm.in
* Chat - @sysadm_in
* Job - @sysadm_in_job
* ? - @sysadminkz
Download Telegram
Fotinet zero day RCE - Stack-based buffer overflow vulnerability in AP

Status - Critical

https://fortiguard.fortinet.com/psirt/FG-IR-25-254
VMware Cloud Foundation updates address multiple vulnerabilities

HIGH

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25733

VMware ESXi, vCenter Server, Workstation, and Fusion updates address multiple vulnerabilities

HIGH

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25717
When OpenBLD.net is next to Wazuh, Elastic, Palo Alto - abuse.ch launches API access by keys.
Forwarded from OpenBLD.net (Yevgeniy Goncharov)
Abuse.ch сегодня тегнул OpenBLD - приятно быть в списке рядом с Splunk, Palo Alto, Wazuh)
CVE-2025-33053, Stealth Falcon And Horus: A Saga Of Middle Eastern Cyber Espionage

The threat actors used a previously undisclosed technique to execute files hosted on a WebDAV server they controlled, by manipulating the working directory of a legitimate built-in Windows tool. Microsoft assigned the vulnerability CVE-2025-33053 and released a patch on June 10, 2025, as part of their June Patch Tuesday updates.

https://research.checkpoint.com/2025/stealth-falcon-zero-day/
Forwarded from OpenBLD.net (Yevgeniy Goncharov)
OpenBLD.net - Phishing Preveting - Toxic trend: Another malware threat targets DeepSeek

DeepSeek-R1 is one of the most popular LLMs right now. Users of all experience levels look for chatbot websites on search engines, and threat actors have started abusing the popularity of LLMs...

Phishing lure, Malicious installer, Loaded implant and more:

https://securelist.com/browservenom-mimicks-deepseek-to-use-malicious-proxy/115728
Red / Blue team, багбаунти, пентесты - ключевой навык в инфобезе.

Самое время прокачать навык веб-пентеста.

Курс от Яндекс Практикума в Казахстане.

Освоить веб-пентест за 6 месяцев, научиться искать уязвимости и защищать веб-приложения, что может быть проще?)

Что внутри:

• Учат и атаковать, и защищать
• Практика в облаке в формате CTF
• Наставники — практикующие специалисты
• Есть модули по безопасному коду и DevSecOps

Подходит опытным айтишникам и студентам техвузов.

Можно протестировать себя - пройдя бесплатный тест на вход.

🎁 Промокод KZ2025 — скидка 12%. Детали → Здесь.

Партнёрский материал
Clone, Compile, Compromise: Water Curse’s Open-Source Malware Trap on GitHub

...The malware enables data exfiltration (including credentials, browser data, and session tokens), remote access, and long-term persistence on infected systems ... a supply chain risk, especially to cybersecurity professionals, game developers, and DevOps teams relying on open-source tooling..:

https://www.trendmicro.com/en_us/research/25/f/water-curse.html
ConnectUnwise: Threat actors abuse ConnectWise as builder for signed malware

Since March 2025 there has been a noticeable increase in infections and fake applications using validly signed ConnectWise samples. Article reveal how bad signing practices allow threat actors to abuse this legitimate software to build and distribute their own signed malware and what security vendors can do to detect them:

https://www.gdatasoftware.com/blog/2025/06/38218-connectwise-abuse-malware