Danish intelligence service said the attacks were part of Russia’s “hybrid war” against the West and an attempt to create instability. The post Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility appeared first on SecurityWeek.
Publicerad: 2025-12-19 15:53:35 CETThe hacking group has been using Group Policy to deploy cyberespionage tools on governmental networks. The post Chinese APT ‘LongNosedGoblin’ Targeting Asian Governments appeared first on SecurityWeek.
Publicerad: 2025-12-19 15:35:59 CETAI adds real value to cybersecurity today, but it cannot yet serve as a single security guardian. Here's how organizations can safely combine AI-driven analysis with deterministic rules and proven security practices.
Publicerad: 2025-12-19 15:00:00 CETNorth Korea shifted its strategy to patiently target "bigger fish" for larger payouts, using sophisticated methods to execute attacks at opportune times.
Publicerad: 2025-12-19 15:00:00 CETMillions of developers can now use the secure, production-ready images made by Docker. The post Docker Makes 1,000 Hardened Images Free and Open Source appeared first on SecurityWeek.
Publicerad: 2025-12-19 14:33:57 CETWatchGuard har publicerat information om en sårbarhet i WatchGuard Fireware OS. Sårbarheten, CVE-2025-14733, beskrivs som kritisk och har fått en CVSS-klassning på 9.3. [1]
Publicerad: 2025-12-19 14:10:00 CETThe exchange has been allegedly involved in laundering money for ransomware groups and other transnational cybercriminal organizations. The post US Shuts Down Crypto Exchange E-Note, Charges Russian Administrator appeared first on SecurityWeek.
Publicerad: 2025-12-19 14:03:39 CETDownloaded from a code library, the information pertains to current and former staff and affiliates, and to alumni and students. The post University of Sydney Data Breach Affects 27,000 Individuals appeared first on SecurityWeek.
Publicerad: 2025-12-19 12:59:57 CETLinked to the Aisuru IoT botnet, Kimwolf was seen launching over 1.7 billion DDoS attack commands and increasing its C&C domain’s popularity. The post ‘Kimwolf’ Android Botnet Ensnares 1.8 Million Devices appeared first on SecurityWeek.
Publicerad: 2025-12-19 12:48:49 CETWatchGuard has released fixes to address a critical security flaw in Fireware OS that it said has been exploited in real-world attacks. Tracked as CVE-2025-14733 (CVSS score: 9.3), the vulnerability has been described as a case of out-of-…
Publicerad: 2025-12-19 12:23:00 CETAuthorities in Nigeria have announced the arrest of three "high-profile internet fraud suspects" who are alleged to have been involved in phishing attacks targeting major corporations, including the main developer behind the RaccoonO365…
Publicerad: 2025-12-19 11:26:00 CETVeckans veckobrev består som vanligt av nyheter, rapporter och analyser men även en liten julhälsning:
Publicerad: 2025-12-19 11:20:00 CETData from Chainalysis and Amazon offers a glimpse into North Korea’s cyber activities surrounding cryptocurrency theft and fake IT workers. The post North Korea’s Digital Surge: $2B Stolen in Crypto as Amazon Blocks 1,800 Fake IT Workers appeared first on SecurityWeek.
Publicerad: 2025-12-19 11:01:36 CETCertain motherboard models from vendors like ASRock, ASUSTeK Computer, GIGABYTE, and MSI are affected by a security vulnerability that leaves them susceptible to early-boot direct memory access (DMA) attacks across architectures that…
Publicerad: 2025-12-19 09:25:00 CETCisco har publicerat information om en kritisk nolldagssårbarhet i Cisco AsyncOS som exploateras av hotaktörer [1]. Sårbarheten (CVE-2025-20393) har fått CVSS-klassificering 10.0 (CVSS v.3.1) av Cisco [2] och berör installationer av Cisco…
Publicerad: 2025-12-19 08:30:00 CETInformation published.
Publicerad: 2025-12-19 02:36:20 CETInformation published.
Publicerad: 2025-12-19 02:01:55 CETInformation published.
Publicerad: 2025-12-19 02:01:50 CETInformation published.
Publicerad: 2025-12-19 02:01:45 CETInformation published.
Publicerad: 2025-12-19 02:01:40 CETInformation published.
Publicerad: 2025-12-19 02:01:35 CETInformation published.
Publicerad: 2025-12-19 02:01:30 CETInformation published.
Publicerad: 2025-12-19 02:01:25 CETInformation published.
Publicerad: 2025-12-19 02:01:20 CETIn the latest attacks against the vendor's SMA1000 devices, threat actors have chained a new zero-day flaw with a critical vulnerability disclosed earlier this year.
Publicerad: 2025-12-18 23:25:46 CETA previously undocumented China-aligned threat cluster dubbed LongNosedGoblin has been attributed to a series of cyber attacks targeting governmental entities in Southeast Asia and Japan. The end goal of these attacks is cyber espionage,…
Publicerad: 2025-12-18 18:34:00 CETASRock, Asus, Gigabyte, and MSI motherboards are vulnerable to early-boot DMA attacks. The post UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks appeared first on SecurityWeek.
Publicerad: 2025-12-18 16:30:00 CETTracked as CVE-2025-37164, the critical flaw could allow unauthenticated, remote attackers to execute arbitrary code. The post HPE Patches Critical Flaw in IT Infrastructure Management Software appeared first on SecurityWeek.
Publicerad: 2025-12-18 16:07:19 CETHewlett Packard Enterprise (HPE) has resolved a maximum-severity security flaw in OneView Software that, if successfully exploited, could result in remote code execution. The critical vulnerability, assigned the CVE identifier…
Publicerad: 2025-12-18 15:39:00 CETTracked as CVE-2025-59374, the issue is a software backdoor implanted in Asus Live Update in a supply chain attack. The post CISA Warns of Exploited Flaw in Asus Update Tool appeared first on SecurityWeek.
Publicerad: 2025-12-18 14:27:51 CETThis week’s ThreatsDay Bulletin tracks how attackers keep reshaping old tools and finding new angles in familiar systems. Small changes in tactics are stacking up fast, and each one hints at where the next big breach could come from. From…
Publicerad: 2025-12-18 14:10:00 CETThreat actors with ties to the Democratic People's Republic of Korea (DPRK or North Korea) have been instrumental in driving a surge in global cryptocurrency theft in 2025, accounting for at least $2.02 billion out of more than $3.4…
Publicerad: 2025-12-18 14:00:00 CET"Prince of Persia" has rewritten the rules of persistence with advanced operational security and cryptographic communication with its command-and-control server.
Publicerad: 2025-12-18 14:00:00 CETWithin the past year, artificial intelligence copilots and agents have quietly permeated the SaaS applications businesses use every day. Tools like Zoom, Slack, Microsoft 365, Salesforce, and ServiceNow now come with built-in AI assistants…
Publicerad: 2025-12-18 12:30:00 CETInformation published.
Publicerad: 2025-12-18 09:00:00 CETThe North Korean threat actor known as Kimsuky has been linked to a new campaign that distributes a new variant of Android malware called DocSwap via QR codes hosted on phishing sites mimicking Seoul-based logistics firm CJ Logistics…
Publicerad: 2025-12-18 08:43:00 CETThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical flaw impacting ASUS Live Update to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability,…
Publicerad: 2025-12-18 06:01:00 CETAttackers are targeting admin accounts, and once authenticated, exporting device configurations including hashed credentials and other sensitive information.
Publicerad: 2025-12-17 23:44:38 CETOn December 3, 2025, the React team released a security advisory regarding a vulnerability, CVE-2025-55182, in the React server that could allow an unauthenticated, remote attacker to perform remote code execution on an affected device or…
Publicerad: 2025-12-17 23:37:17 CETAnthropic proves that LLMs can be fairly resistant to abuse. Most developers are either incapable of building safer tools, or unwilling to invest in doing so.
Publicerad: 2025-12-17 23:01:58 CETThe remote access Trojan lets an attacker remotely control a victim's phone and can generate malicious apps from inside the Play Store.
Publicerad: 2025-12-17 22:38:50 CETThe future of cybersecurity means defending everywhere. Securing IoT, cloud, and remote work requires a unified edge-to-cloud strategy. (First in a three-part series.)
Publicerad: 2025-12-17 22:14:12 CETIn the React2Shell saga, nonworking and trivial proof-of-concept exploits led to confusion and perhaps a false sense of security. Can the onslaught of PoCs be tamed?
Publicerad: 2025-12-17 21:58:31 CETAs quantum computing advances, secure, interoperable standards will be critical to making quantum key distribution (QKD) practical, trusted, and future-proof.
Publicerad: 2025-12-17 21:46:43 CETOn December 10, Cisco became aware of a new cyberattack campaign targeting a limited subset of appliances with certain ports open to the internet that are running Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email…
Publicerad: 2025-12-17 17:00:00 CETASUS Live Update contains an embedded malicious code vulnerability client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting…
Publicerad: 2025-12-17 01:00:00 CETSonicWall SMA1000 contains a missing authorization vulnerability that could allow for privilege escalation appliance management console (AMC) of affected devices. | Åtgärd: Apply mitigations per vendor instructions, follow applicable BOD…
Publicerad: 2025-12-17 01:00:00 CETCisco Secure Email Gateway, Secure Email, AsyncOS Software, and Web Manager appliances contains an improper input validation vulnerability that allows threat actors to execute arbitrary commands with root privileges on the underlying…
Publicerad: 2025-12-17 01:00:00 CETFortinet FortiOS, FortiSwitchMaster, FortiProxy, and FortiWeb contain an improper verification of cryptographic signature vulnerability that may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a…
Publicerad: 2025-12-16 01:00:00 CETGladinet CentreStack and TrioFox contain a hardcoded cryptographic keys vulnerability for their implementation of the AES cryptoscheme. This vulnerability degrades security for public exposed endpoints that may make use of it and may offer…
Publicerad: 2025-12-15 01:00:00 CETApple iOS, iPadOS, macOS, and other Apple products contain a use-after-free vulnerability in WebKit. Processing maliciously crafted web content may lead to memory corruption. This vulnerability could impact HTML parsers that use WebKit,…
Publicerad: 2025-12-15 01:00:00 CETI veckans läsning finns bland annat en artikel om vårt deltagande i NATO-övningen Cyber Coalition tillsammans med Nationellt cybersäkerhetscenter.
Publicerad: 2025-12-12 13:00:00 CETSierra Wireless AirLink ALEOS contains an unrestricted upload of file with dangerous type vulnerability. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An…
Publicerad: 2025-12-12 01:00:00 CETGoogle Chromium contains an out of bounds memory access vulnerability in ANGLE that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability could affect multiple web browsers that…
Publicerad: 2025-12-12 01:00:00 CETOSGeo GeoServer contains an improper restriction of XML external entity reference vulnerability that occurs when the application accepts XML input through a specific endpoint /geoserver/wms operation GetMap and could allow an attacker to…
Publicerad: 2025-12-11 01:00:00 CETFlera leverantörer har släppt sina månatliga säkerhetsuppdateringar för december.
Publicerad: 2025-12-10 10:30:00 CETCVSSv3 Score: 5.9 A key management error vulnerability [CWE-320] in FortiManager, FortiAnalyzer and FortiPortal may allow an authenticated admin to retrieve a certificate's private key via the device's admin shell. Revised on 2025-12-10 00:00:00
Publicerad: 2025-12-09 09:00:00 CETCVSSv3 Score: 6.2 An Improper access control vulnerability [CWE-284] in FortiSOAR may allow Information disclosure to an authenticated attacker via crafted requests Revised on 2025-12-09 00:00:00
Publicerad: 2025-12-09 09:00:00 CETCVSSv3 Score: 7.1 A reliance on cookie without validation or integrity checking vulnerability [CWE-565] in FortiWeb may allow an unauthenticated attacker to execute arbitrary operations on the system via crafted HTTP or HTTPS request via…
Publicerad: 2025-12-09 09:00:00 CETCVSSv3 Score: 4.4 A use of password hash instead of password for authentication vulnerability [CWE-836] in FortiWeb may allow an unauthenticated attacker to use the hash in place of the password to authenticate via crafted HTTP/HTTPS requests. Revised on 2025-12-09 00:00:00
Publicerad: 2025-12-09 09:00:00 CETCVSSv3 Score: 6.5 An Unverified Password Change vulnerability [CWE-620] in FortiSOAR may allow an attacker who gained access to a victim's user account to reset the account credentials without being prompted for the account's password Revised on 2025-12-09 00:00:00
Publicerad: 2025-12-09 09:00:00 CETCVSSv3 Score: 6.4 An Incorrect Authorization vulnerability [CWE-863] in FortiPortal may allow an authenticated attacker to reboot a shared FortiGate device via crafted HTTP requests. Revised on 2025-12-09 00:00:00
Publicerad: 2025-12-09 09:00:00 CETCVSSv3 Score: 6.3 An insertion of sensitive information into log file vulnerability [CWE-532] in FortiOS, FortiProxy, FortiPAM and FortiSRA may allow a read-only administrator to retrieve API tokens of other administrators via observing…
Publicerad: 2025-12-09 09:00:00 CETCVSSv3 Score: 5.3 An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSLVPN may allow an attacker to maintain access to network resources via an active session not terminated after a user's password change under…
Publicerad: 2025-12-09 09:00:00 CETCVSSv3 Score: 2.6 A Direct Request ('Forced Browsing') [CWE-425] vulnerability in FortiAuthenticator logs may allow an authenticated attacker with at least sponsor permissions to read and download device logs via accessing specific endpoints. Revised on 2025-12-09 00:00:00
Publicerad: 2025-12-09 09:00:00 CETCVSSv3 Score: 9.1 An Improper Verification of Cryptographic Signature vulnerability[CWE-347] in FortiOS, FortiWeb, FortiProxy and FortiSwitchManager mayallow an unauthenticated attacker to bypass the FortiCloud SSO loginauthentication via…
Publicerad: 2025-12-09 09:00:00 CETRARLAB WinRAR contains a path traversal vulnerability allowing an attacker to execute code in the context of the current user. | Åtgärd: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or…
Publicerad: 2025-12-09 01:00:00 CETVi vill uppmärksamma att CERT-SE tidigare idag har skickat ut ett blixtmeddelande rörande den kritiska sårbarheten i React Server Components (RSC). Notera att vi nyligen har ändrat avsändaradressen för våra blixtmeddelanden. Om ni…
Publicerad: 2025-12-05 13:15:00 CETMultiple vulnerabilities in Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker to either disclose sensitive information or conduct a reflected cross-site…
Publicerad: 2025-12-04 15:23:54 CETEn kritisk sårbarhet har identifierats i React Server Components som påverkar React 19, bland annat Next.js.[1] Omedelbar åtgärd krävs, bland annat genom att uppdatera till senaste versionen av React och dess beroenden. [2]
Publicerad: 2025-12-04 09:30:00 CETI veckans läsning hittar du blandade nyheter om olika cybersäkerhetsinitiativ i Sverige, bland annat information om att regeringen nu beslutat att ge Sveriges nationella cybersäkerhetscenter i uppdrag att öka säkerheten kopplat till…
Publicerad: 2025-11-28 13:45:00 CETCERT-SE har tidigare informerat om den självreplikerande, skadliga koden “Shai-Hulud malware”. [1] Det rapporteras nu om observationer där man identifierat en ny version av den skadliga koden som fått snabb spridning den senaste veckan.…
Publicerad: 2025-11-25 13:37:00 CETMultiple vulnerabilities in Cisco Unified Contact Center Express (Unified CCX), Cisco Unified Contact Center Enterprise (Unified CCE), Cisco Packaged Contact Center Enterprise (Packaged CCE), and Cisco Unified Intelligence Center (CUIC)…
Publicerad: 2025-11-18 15:49:09 CETEn kritisk sårbarhet har upptäckts i Fortinets produkt FortiWeb. Sårbarheten, CVE-2025-64446, har fått en CVSS-klassning på 9.8 av NIST. [1]
Publicerad: 2025-11-17 16:15:00 CETA vulnerability in the web-based management interface of Cisco Catalyst Center Virtual Appliance could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input…
Publicerad: 2025-11-13 17:00:00 CETA vulnerability in Cisco Catalyst Center could allow an authenticated, remote attacker to execute operations that should require Administrator privileges. The attacker would need valid read-only user credentials. This vulnerability is due…
Publicerad: 2025-11-13 17:00:00 CETA vulnerability in the web-based management interface of Cisco Catalyst Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This…
Publicerad: 2025-11-13 17:00:00 CETA vulnerability in the REST API of Cisco Catalyst Center could allow an authenticated, remote attacker to execute arbitrary commands in a restricted container as the root user. This vulnerability is due to insufficient validation of user-…
Publicerad: 2025-11-13 17:00:00 CETA vulnerability in Cisco Catalyst Center Virtual Appliance could allow an authenticated, remote attacker to elevate privileges to Administrator on an affected system. This vulnerability is due to insufficient validation of user-supplied…
Publicerad: 2025-11-13 17:00:00 CETMultiple vulnerabilities in the Java Remote Method Invocation (RMI) process of Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to upload arbitrary files, bypass authentication, execute…
Publicerad: 2025-11-13 13:48:42 CETIngen sammanfattning tillgänglig.
Publicerad: 2025-11-12 18:00:00 CETIngen sammanfattning tillgänglig.
Publicerad: 2025-11-12 18:00:00 CETIngen sammanfattning tillgänglig.
Publicerad: 2025-11-11 20:15:00 CETIngen sammanfattning tillgänglig.
Publicerad: 2025-11-03 18:00:00 CETIngen sammanfattning tillgänglig.
Publicerad: 2025-10-08 18:00:00 CESTIngen sammanfattning tillgänglig.
Publicerad: 2025-10-08 18:00:00 CESTIngen sammanfattning tillgänglig.
Publicerad: 2025-09-30 21:43:00 CESTIngen sammanfattning tillgänglig.
Publicerad: 2025-09-10 18:00:00 CESTIngen sammanfattning tillgänglig.
Publicerad: 2025-09-10 18:00:00 CESTIngen sammanfattning tillgänglig.
Publicerad: 2025-09-10 18:00:00 CESTA vulnerability classified as problematic has been found in Ortus Solutions ColdBox Elixir 3.1.6. This affects an unknown part of the file src/defaultConfig.js of the component ENV Variable Handler. The manipulation leads to information…
Publicerad: 2023-11-06 09:15:21 CETA vulnerability was found in Vaerys-Dawn DiscordSailv2 up to 2.10.2. It has been rated as critical. Affected by this issue is some unknown functionality of the component Tag Handler. The manipulation leads to improper access controls.…
Publicerad: 2023-11-06 02:15:08 CET** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Magnesium-PHP up to 0.3.0. It has been classified as problematic. Affected is the function formatEmailString of the file…
Publicerad: 2023-11-05 22:15:09 CETA vulnerability was found in Vaerys-Dawn DiscordSailv2 up to 2.10.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Command Mention Handler. The manipulation leads to improper…
Publicerad: 2023-11-05 22:15:09 CETA security issue was discovered in kube-apiserver that allows an aggregated API server to redirect client traffic to any URL. This could lead to the client performing unexpected actions as well as forwarding the client's API server credentials to third parties.
Publicerad: 2023-11-03 21:15:08 CETIvanti Avalanche Smart Device Service Missing Authentication Local Privilege Escalation Vulnerability
Publicerad: 2023-11-03 21:15:08 CETIvanti Avalanche Printer Device Service Missing Authentication Local Privilege Escalation Vulnerability
Publicerad: 2023-11-03 21:15:08 CETA locally authenticated attacker with low privileges can bypass authentication due to insecure inter-process communication.
Publicerad: 2023-11-03 21:15:08 CETIn swtpm before 0.4.2 and 0.5.x before 0.5.1, a local attacker may be able to overwrite arbitrary files via a symlink attack against a temporary file such as TMP2-00.permall.
Publicerad: 2023-11-03 05:15:15 CETbcrypt password hashing in Botan before 2.1.0 does not correctly handle passwords with a length between 57 and 72 characters, which makes it easier for attackers to determine the cleartext password.
Publicerad: 2023-11-03 02:15:07 CET2.5 million people were affected, in a breach that could spell more trouble down the line.
Publicerad: 2022-08-31 14:57:48 CESTResearchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.
Publicerad: 2022-08-30 18:00:43 CESTOver 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.
Publicerad: 2022-08-29 16:56:19 CESTLockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.
Publicerad: 2022-08-26 18:44:27 CESTTens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
Publicerad: 2022-08-25 20:47:15 CESTTwitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk.
Publicerad: 2022-08-24 16:17:04 CESTCISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.
Publicerad: 2022-08-23 15:19:58 CESTFake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.
Publicerad: 2022-08-22 15:59:06 CESTSeparate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.
Publicerad: 2022-08-19 17:25:56 CESTAn insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.
Publicerad: 2022-08-18 16:31:38 CEST