Windows OLE Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21298
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21298
Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch
https://claroty.com/team82/research/hack-the-emulated-planet-vulnerability-hunting-planet-wgs-804hpt-industrial-switch?utm_source=se%D1%81uritylabru
https://claroty.com/team82/research/hack-the-emulated-planet-vulnerability-hunting-planet-wgs-804hpt-industrial-switch?utm_source=se%D1%81uritylabru
ChatGPT-4o contains security bypass vulnerability through time and search functions called "Time Bandit"
https://kb.cert.org/vuls/id/733789
https://kb.cert.org/vuls/id/733789
kb.cert.org
CERT/CC Vulnerability Note VU#733789
ChatGPT-4o contains security bypass vulnerability through time and search functions called "Time Bandit"
Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2025-21293)
https://birkep.github.io/posts/Windows-LPE/
https://birkep.github.io/posts/Windows-LPE/
A tale of mediocracy
Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2025-21293)
Introduction
Go Supply Chain Attack: Malicious Package Exploits Go Module...
https://socket.dev/blog/malicious-package-exploits-go-module-proxy-caching-for-persistence
https://socket.dev/blog/malicious-package-exploits-go-module-proxy-caching-for-persistence
Socket
Go Supply Chain Attack: Malicious Package Exploits Go Module...
Socket researchers uncovered a backdoored typosquat of BoltDB in the Go ecosystem, exploiting Go Module Proxy caching to persist undetected for years.
Microsoft: 1000s of ASP.NET Keys Allow Web Server RCE
https://www.darkreading.com/remote-workforce/microsoft-public-asp-net-keys-web-server-rce
https://www.darkreading.com/remote-workforce/microsoft-public-asp-net-keys-web-server-rce
Dark Reading
Microsoft: 1000s of ASP.NET Keys Allow Web Server RCE
Developers are pulling in publicly available ASP.NET keys into their environments, without realizing that cyberattackers can use them for clandestine code injection.
It's started! The robot attacked the man. He tried to do it from from the headbutt.
Conquering the summit begins with the first step on it:
https://cs15.pikabu.ru/video/2025/02/19/1739980153232923984_a5cb4e64_448x256.mp4
Conquering the summit begins with the first step on it:
https://cs15.pikabu.ru/video/2025/02/19/1739980153232923984_a5cb4e64_448x256.mp4