A high-severity security flaw has been disclosed in ServiceNow’s platform that, if successfully exploited, could result in data exposure and exfiltration. The vulnerability, tracked as CVE-2025-3648 (CVSS score: 8.2), has been described as a case of data inference in Now Platform through conditional access control list (ACL) rules. It has been codenamed Count(er) Strike. “A […]
Category Archives: Uncategorized
Stories about Chinese APTs attacking the US and Canada are plentiful. In a turnabout, researchers found what they believe is a North American entity attacking a Chinese entity, thanks to a mysterious issue in Microsoft Exchange. Go to Source Author: Nate Nelson, Contributing Writer
A container escape flaw involving the NVIDIA Container Toolkit could have enabled a threat actor to access AI datasets across tenants. Go to Source Author: Alexander Culafi
Worried about hackers employing LLMs to write powerful malware? Using targeted reinforcement learning (RL) to train open source models in specific tasks has yielded the capability to do just that. Go to Source Author: Nate Nelson, Contributing Writer
The Initial Access Broker (IAB) known as Gold Melody has been attributed to a campaign that exploits leaked ASP.NET machine keys to obtain unauthorized access to organizations and peddle that access to other threat actors. The activity is being tracked by Palo Alto Networks Unit 42 under the moniker TGR-CRI-0045, where “TGR” stands for “temporary […]
An impostor who posed as the secretary of state in text and voice communications with diplomats and politicians demonstrates the increased sophistication of and national security threat posed by the AI technology. Go to Source Author: Elizabeth Montalbano, Contributing Writer
To help counter crime, today’s organizations require a cyber-defense strategy that incorporates the mindset of the cybercriminal. Go to Source Author: Bogdan Botezatu
A threat actor with suspected ties to India has been observed targeting a European foreign affairs ministry with malware capable of harvesting sensitive data from compromised hosts. The activity has been attributed by Trellix Advanced Research Center to an advanced persistent threat (APT) group called DoNot Team, which is also known as APT-C-35, Mint Tempest, […]
Though the victims list on its site has since been taken down, the group plans on leaking the rest of the files stolen from its victims. Go to Source Author: Kristina Beek
From data fog to threat clarity: Automating security analytics helps security teams stop fighting phantoms and respond to what matters. Go to Source Author: George V. Hulme, Contributing Writer
