This Week in Security: XRP Poisoned, MCP Bypassed, and More https://hackaday.com/2025/04/25/this-week-in-security-xrp-poisoned-mcp-bypassed-and-more/ #ThisWeekinSecurity #supplychainattack #HackadayColumns #SecurityHacks #News #CVEs #mcp

This Week in Security: XRP Poisoned, MCP Bypassed, and More https://hackaday.com/2025/04/25/this-week-in-security-xrp-poisoned-mcp-bypassed-and-more/ #ThisWeekinSecurity #supplychainattack #HackadayColumns #SecurityHacks #News #CVEs #mcp
Join Sonatype's Brian Fox, Ilkka Turunen, and OpenSSF's Christopher "CRob" Robinson for a live discussion exploring the risks of over-reliance on #CVEs and how to build a resilient, diversified security strategy.
April 22 |
9:00 AM ET
This Week in Security: No More CVEs, 4chan, and Recall Returns https://hackaday.com/2025/04/18/this-week-in-security-no-more-cves-4chan-and-recall-returns/ #ThisWeekinSecurity #HackadayColumns #SecurityHacks #recall #mitre #Vibes #News #CVEs
This Week in Security: No More CVEs, 4chan, and Recall Returns - The sky is falling. Or more specifically, it was about to fall, according to the s... - https://hackaday.com/2025/04/18/this-week-in-security-no-more-cves-4chan-and-recall-returns/ #thisweekinsecurity #hackadaycolumns #securityhacks #recall #mitre #vibes #news #cves
bye bye CVEs tomorrow everyone back to bugtraq like the good old days
I actually like how it was done in bugtraq etc https://en.wikipedia.org/wiki/Bugtraq #cve #cves #bugtraq #usenet
#goodoldays #hacking #cybersecurity
@domi@donotsta.re on #CWE I agree, they do absolutely suck. #CVEs are still useful for tracking #security issues in the same place imho
No Project Is an Island: Why You Need SBOMs and Dependency Management https://nxdomain.no/~peter/no_project_is_an_island.html #sbom #development #dependencies #security #cves The system you develop and maintain does not exist in isolation. Providing SBOMs for our work is our way to show we care.
Record-breaking number of vulnerabilities predicted for 2025 #CyberSecurity #CVEs
https://betanews.com/2025/02/25/record-breaking-number-of-vulnerabilities-predicted-for-2025/
768 CVEs Exploited in the Wild in 2024: A 20% Increase Noted - https://www.redpacketsecurity.com/768-cves-exploited-in-the-wild-in-2024/
Not the biggest question right now, for sure, but one that still has worldwide effects:
With the ongoing #BrainDrain (aka #layoffs) and meddling in US institutions, how will software security analysis be affected? Can #NVD still be trusted with being the main source of #CVEs in many popular tools?
Should e.g. Europe build up own capacities in vulnerability analysis and set up own databases? Are there existing solutions already?
#infosec #cybersecurity #threatmodeling
40,000+ CVEs Published In 2024, Marking A 38% Increase From 2023 https://cybersecuritynews.com/40000-cves-published-in-2024/ #ComputerVulnerabilityNews #VulnerabilityManagement #CyberSecurityNews #VulnerabilityNews #cybersecurity #CVEs
Aiming for 100% patching of even critical and high severity vulnerabilities can feel like chasing the wind. So, what *should* #cybersecurity pros do? They should focus on what matters!
Patching every vulnerability isn’t just impractical; it’s unnecessary. And really, #security isn’t about perfection — it’s about prioritization. You’re better off focusing on vulnerabilities that truly matter to your organization’s risk posture.
Here's how you can get help with prioritizing all of those those #CVEs.
https://graylog.org/post/why-patching-isnt-the-ultimate-goal-in-cybersecurity/ #CVE #cyberrisk
Listen to our VP of Security, Josh Bressers on the Floss Weekly podcast. Josh talks with hosts Jonathan Bennett and Dan Lynch about #SBOMs #CVEs #opensource and so much more! Listen now
https://hackaday.com/2024/10/30/floss-weekly-episode-807-bitten-by-the-penguin/
Happy Friday everyone!
A Joint Advisory from the National Security Agency, Federal Bureau of Investigation (FBI), Cyber National Mission Force, and the National Cyber Security Centre provides updates on the Russian Federation's Foreign Intelligence Service, or #SVR.
According to the advisory, #APT29 (a.k.a Midnight Blizzard, Cozy Bear, and the Dukes) has targeted the defense, technology, and finance sectors to collect foreign intelligence and enable future cyber operations. They aim to exploit software vulnerabilities for initial access and escalate privileges. They also utilize spearphishing campaigns, password spraying, abuse of supply chain and trusted relationships. They also utilize custom malware and living-off-the-land (LOLBINs) techniques for multiple techniques.
The report includes a list of #CVEs that APT29 has been observed exploiting and attach the vendor and product that are effected with details that describe the vulnerability along with a section of mitigations that your organization can take to increase your security posture.
If you are looking for behaviors that are attributed to APT29, look no further than the MITRE ATT&CK Matrix! This resource has collected historic #TTPs and behaviors and referenced them as well. So while you are working on hardening your environment you can also hunt for their activity as well! Enjoy and Happy Hunting!
Article Source:
Update on SVR Cyber Operations and Vulnerability Exploitation
https://www.ic3.gov/Media/News/2024/241010.pdf
Mitre source:
https://attack.mitre.org/groups/G0016/
Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday #huntoftheday #gethunting Cyborg Security, Now Part of Intel 471
Did you know that the #trivy version matters for the number of #CVEs found?
We all knew that that CVE-database is vital, but the trivy version as well?
With CVE-2024-24790 I found that out the hard way.
So if you're using "docker run aquasec/trivy" I can recommend --pull=always to make sure you're always getting the latest and greatest results.
Get ready for an exciting session on 2024-09-11! Join Steven Borrelli as he shares insights from KubCon, including Greg's CVE discussion and Linus Torvald's keynote! #Linux #CVEs #SLUUG https://www.meetup.com/saint-louis-unix-users-group/events/300428326