pouet.chapril.org est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Chapril https://www.chapril.org est un projet de l'April https://www.april.org

Administré par :

Statistiques du serveur :

1,1K
comptes actifs

#vulnerability

30 messages22 participants5 messages aujourd’hui

Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images

“Threat actors are using the “mu-plugins” directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites.mu-plugins, short for must-use plugins, refers to plu ...continues

See gadgeteer.co.za/hackers-exploi

A laptop displaying a WordPress login screen, featuring a password field and a faint handprint in the background.
GadgeteerZA · Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images“Threat actors are using the “mu-plugins” directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and

OttoKit WordPress Plugin Vulnerability has been Patched

This vulnerability is tracked as CVE-2025-3102 with a
CVSS score of 8.1.

Pulse ID: 67f86f3e478f6cc0306f815b
Pulse Link: otx.alienvault.com/pulse/67f86
Pulse Author: cryptocti
Created: 2025-04-11 01:24:14

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomware

Pulse ID: 67f71a9514c00a52486bcf28
Pulse Link: otx.alienvault.com/pulse/67f71
Pulse Author: cryptocti
Created: 2025-04-10 01:10:45

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Exploitation of CLFS zero-day leads to ransomware activity

A zero-day elevation of privilege vulnerability in Windows Common Log File System (CLFS) has been exploited against targets in IT, real estate, finance, software, and retail sectors across multiple countries. The exploit, deployed by PipeMagic malware and attributed to Storm-2460, enables privilege escalation and ransomware deployment. The vulnerability, CVE-2025-29824, was patched on April 8, 2025. The attack involves downloading malicious MSBuild files, using PipeMagic, and exploiting CLFS to inject payloads into system processes. Post-exploitation activities include credential theft and ransomware deployment, with similarities to RansomEXX. Microsoft recommends immediate patching and provides mitigation strategies, detection methods, and hunting queries to counter this threat.

Pulse ID: 67f6b1c7251291d51de23a7a
Pulse Link: otx.alienvault.com/pulse/67f6b
Pulse Author: AlienVault
Created: 2025-04-09 17:43:35

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Exploitation of CLFS zero-day leads to ransomware activity

A zero-day elevation of privilege vulnerability in the Windows Common Log File System (CLFS) has been exploited against targets in various sectors across multiple countries. The exploit, deployed by PipeMagic malware and attributed to Storm-2460, enables privilege escalation and ransomware deployment. Post-exploitation activities include credential theft and file encryption. The vulnerability, tracked as CVE-2025-29824, has been patched. Mitigation strategies include applying security updates, enabling cloud-delivered protection, and implementing advanced security measures. Multiple detection methods and hunting queries are provided for identifying and responding to this threat.

Pulse ID: 67f5d9cac64a676c99e7a36c
Pulse Link: otx.alienvault.com/pulse/67f5d
Pulse Author: AlienVault
Created: 2025-04-09 02:22:02

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

NEW - ⛸️🧱🖥️

DCG Domain Blocklist available - last updated 2025/04/08

1689244 - Domains blocked with that build !

🦜
🐻
Supercharging your content blocker to increase privacy and security.

All available lists:
- uBlockOrigin
- Hosts format & Hosts format with wildcards
- dnsmasq with wildcards

🌳
Ready to use lists combined from many permissively licensed sources.

divested.dev/pages/dnsbl

#divested #DivestedComputingGroup

#DCG

#fsf #FUTO #Fedora #codeberg #hardening #linuxtech #cybersec #cybersecurity #infosec #antivirus #hackernews
#opensource #linuxsecurity #vulnerabilities #vulnerability #alpinelinux #router #skynet #foss #freeyourmind

divested.devDnsbl - Divested Computing