Edited. Thanks!
1
Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access
(thehackernews.com)
10
CursorJack’ Attack Path Exposes Code Execution Risk in AI Development - Infosecurity Magazine
(www.infosecurity-magazine.com)
20
Android OS-Level Attack Bypasses Mobile Payment Security - Infosecurity Magazine
(www.infosecurity-magazine.com)
5
From Windows to macOS: ClickFix attacks shift tactics with ChatGPT-based lures
(securityaffairs.com)
7
Security Flaw in AWS Bedrock Code Interpreter Raises Alarms - Infosecurity Magazine
(www.infosecurity-magazine.com)
Sorry. It was not paywalled for me when I first saw. More info from different source: https://feedly.com/cve/CVE-2025-6545
The incident occurred on June 12, 2025, due to a policy change that contained blank fields, causing 503 errors in Google Cloud and Google Workspace APIs. The root cause was:
- A new feature added to Service Control on May 29, 2025, without adequate error handling.
- The policy change with blank fields was globally replicated and caused Service Control binaries to crash.
Thanks! Corrected
The first vulnerability, CVE-2025-5054, affects Ubuntu’s Apport crash reporting system, while the second, CVE-2025-4598, impacts systemd-coredump, the default core dump handler used across Red Hat Enterprise Linux 9 and 10, as well as Fedora distributions.
Leak extortion is the main issue nowadays, not covered by backups, I'm afraid.
!selfhosted@lemmy.world to the win!
view more: next ›
Done, thanks!