fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

9.8K
active users

#infosec

1.1K posts290 participants76 posts today

Multiple security vulnerabilities reported in Zoom Workplace applications

Zoom has disclosed multiple security vulnerabilities affecting its Workplace Apps across all major operating systems that could enable attackers to escalate privileges, execute denial-of-service attacks, and remotely execute malicious code on affected systems.

**This is not an urgent advisory, but it's very smart to update your Zoom Apps. Even if the flaws are not immediately exploited, Zoom is used in many scenarios with external persons, links, files. Don't risk it, update the app. It's a fairly trivial process - just Check for Updates and run the installer.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

Critical authentication bypass vulnerability reported in Ivanti Neurons for ITSM

Ivanti has released security updates addressing a critical authentication bypass vulnerability (CVE-2025-22462) in on-premises Neurons for ITSM solutions. It allows unauthenticated remote attackers to gain administrative access. Patches are available for all affected versions (2023.4, 2024.2, and 2024.3).

**If you're running on-premises Ivanti Neurons for ITSM versions 2023.4, 2024.2, 2024.3 or earlier, prioritize patching it with the May 2025 Security Patch. As a mitigating measures, ensure your IIS website has restricted access to specific IP addresses and domain names, and implement a DMZ configuration if users access the solution from outside your company network.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

BeyondMachinesCritical authentication bypass vulnerability reported in Ivanti Neurons for ITSMIvanti has released security updates addressing a critical authentication bypass vulnerability (CVE-2025-22462) in on-premises Neurons for ITSM solutions. It allows unauthenticated remote attackers to gain administrative access. Patches are available for all affected versions (2023.4, 2024.2, and 2024.3).

Ivanti reports actively exploited EPMM flaws, urges immediate patching

Ivanti has issued an urgent security advisory warning that attackers are actively chaining two vulnerabilities (CVE-2025-4427 and CVE-2025-4428) in Endpoint Manager Mobile's on-premises deployments to gain unauthorized access and execute malicious code. Some customers have already been compromised, urgent patching is advised.

**If you are using Ivanti Endpoint Manager Mobile on premises, this is an URGENT advisory. Update your EPMM because it's already actively hacked, using flaws that are not even deemed critical. Just another reminder to always keep up with patches.**
#cybersecurity #infosec #attack #activeattack
beyondmachines.net/event_detai

PyPI package targets Solana developers

A malicious PyPI package named solana-token has been discovered targeting Solana blockchain developers. The package, downloaded over 600 times, attempts to steal source code and developer secrets from infected machines. It uses suspicious behaviors like communicating with IP addresses on non-standard ports and reading from files to exfiltrate data to a remote server. This attack is part of a broader trend of supply chain attacks on cryptocurrency projects, with 23 such campaigns identified in 2024 alone. The package name was previously used for another malicious module, suggesting possible reuse by the same threat actors. Developers are urged to monitor for suspicious activity in open source and third-party software to prevent such supply chain attacks.

Pulse ID: 6823b32f7b5f6ffcac1ab255
Pulse Link: otx.alienvault.com/pulse/6823b
Pulse Author: AlienVault
Created: 2025-05-13 21:01:35

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.