Latest Posts
Major Supply Chain Attack Impacting React NativeZero-day in Windows Server 2025’s Active Directory enables full Domain TakeoverURGENT COMMVAULT ALERT CVE-2025-3928 Enables M365 Tenant CompromiseFive windows 0-days: The Lazarus Group Says Thanks for Not PatchingCPU Based Ransomware. Oof. How CPU Vulnerabilities Open the Door to Microcode Ransomware
  • Follow
  • Follow
  • Follow
  • Follow
  • Home
  • BULLETINS
  • ABOUT US
  • Free Security Resources
    • Training Workshops
  • CONTACT US
    • Subscribe to Free Newsletter!
    • Tell Your Story!
SAP Under Siege: Patch Now or Pay Later

SAP Under Siege: Patch Now or Pay Later

by Jonathan R. Brennan, CISSP | May 14, 2025 | Bulletins

Unveiling the Critical SAP Vulnerabilities SAP NetWeaver Composes Nighmares. The Impact of CVE-2025-31324 and CVE-2025-42999 Discover the latest insights into the severe vulnerabilities impacting SAP systems worldwide. Learn how to protect your business-critical...
May 2025 Patch Tuesday: Five Zero-Days Unleashed and Critical Flaws Demand Action

May 2025 Patch Tuesday: Five Zero-Days Unleashed and Critical Flaws Demand Action

by Jonathan R. Brennan, CISSP | May 14, 2025 | Bulletins, Uncategorized

Stay Ahead of Cyber Threats Critical Security Updates. Time to Panic Less, Patch More. Microsoft’s May 2025 Patch Tuesday isn’t just another update cycle—it’s a five-alarm situation for IT and security teams. This month’s release includes fixes for 72 vulnerabilities,...
Blob URI Phishing: The Sneaky Threat Slipping Past Your Defenses

Blob URI Phishing: The Sneaky Threat Slipping Past Your Defenses

by Jonathan R. Brennan, CISSP | May 12, 2025 | Bulletins

Unmasking the Invisible Threat Understanding HTML Smuggling: A New Era of Phishing Yes,  The name is absurd.  We agree.  Let’s also agree to move past that because this is a serious threat.   Blob URI phishing is a stealthy, modern twist on HTML Smuggling that allows...
RATatouille Strikes: Remote Access Trojan Baked into Popular NPM Package rand-user-agent

RATatouille Strikes: Remote Access Trojan Baked into Popular NPM Package rand-user-agent

by Jonathan R. Brennan, CISSP | May 11, 2025 | Bulletins

Attackers spiked the deprecated but widely downloaded rand-user-agent npm package with a stealthy Remote Access Trojan (RAT). Now dubbed “RATatouille,” the malware gives adversaries remote access to systems via poisoned developer tools. Here’s how it happened—and how...
Cisco IOS XE Flaw Exposes Wireless Controllers to Full Takeover

Cisco IOS XE Flaw Exposes Wireless Controllers to Full Takeover

by Jonathan R. Brennan, CISSP | May 9, 2025 | Bulletins

Understanding the Risks Embedded Wireless Controller Vulnerabilities A Hard-Coded Catastrophe Cisco has dropped a patch for a nasty flaw in IOS XE Wireless LAN Controllers—CVE-2025-20188. The culprit? A hard-coded JSON Web Token (JWT) in the ‘Out-of-Band AP Image...
« Older Entries
Next Entries »

Follow Us

  • Facebook
  • Twitter
  • Instagram
  • LinkedIn
  • YouTube

Search

Recent Posts

  • Major Supply Chain Attack Impacting React Native
  • Zero-day in Windows Server 2025’s Active Directory enables full Domain Takeover
  • URGENT COMMVAULT ALERT CVE-2025-3928 Enables M365 Tenant Compromise
  • Five windows 0-days: The Lazarus Group Says Thanks for Not Patching
  • CPU Based Ransomware. Oof. How CPU Vulnerabilities Open the Door to Microcode Ransomware

Categories

  • Bulletins
  • NEWS
  • Resources
  • Training
  • Uncategorized
  • User Stories

SecurityBlotter.com
Panic More. Patch Less.



Copyright 2025All rights reserved. Duplication or republication of any contents is prohibited without written permission from SecurityBlotter.

Recent News

  • Supply Chain CompromiseMajor Supply Chain Attack Impacting React Native
  • Zero-day in Windows Server 2025’s Active Directory…
  • URGENT COMMVAULT ALERT CVE-2025-3928 Enables M365…

Designed by Elegant Themes | Powered by WordPress