GLOBAL SITUATIONMONITORING
482 published briefsUTCFri, Apr 3 23:33:02

Live Feeds

Sky News
Al Jazeera
DW News
TRT News
  • Grafana Patches Critical SCIM Flaw

    Grafana Patches Critical SCIM Flaw

    Grafana has patched a critical security flaw, CVE-2025-41115, in its SCIM component. This vulnerability could lead to user impersonation or privilege escalation in affected Grafana Enterprise versions. Users are advised to update immediately.

    1–2 minutes
  • France Delivers SAMP/T Air Defense to Ukraine

    France Delivers SAMP/T Air Defense to Ukraine

    France to boost Ukraine’s air defense with eight advanced SAMP/T NG systems, equipped with Aster 30 Block 1 NT missiles to counter ballistic and hypersonic threats.

    1–2 minutes
  • CVE-2025-8855: 2FA Bypass in Brokerage Automation

    CVE-2025-8855: 2FA Bypass in Brokerage Automation

    CVE-2025-8855 is a critical 2FA bypass vulnerability in Optimus Software’s Brokerage Automation platform. It combines authorization bypass, weak password recovery, and authentication bypass flaws, leading to high-severity risks and unauthorized access.

    3–4 minutes
  • PhantomRaven Malware Found in 126 npm Packages, Stealing GitHub Tokens

    PhantomRaven Malware Found in 126 npm Packages, Stealing GitHub Tokens

    PhantomRaven exploits npm packages to steal GitHub tokens and CI/CD secrets, Koi Security says.

    1–2 minutes
  • Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases

    Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases

    Safery is a malicious Chrome wallet extension that hides stolen Ethereum seed phrases inside Sui micro-transactions; defenders should monitor unexpected browser RPC calls and on-chain writes during wallet import.

    1–2 minutes
  • Cisco RCE Vulnerability Affects Security Appliances

    Cisco RCE Vulnerability Affects Security Appliances

    Cisco has identified a critical RCE vulnerability, CVE-2024-20353, affecting its Secure Web Appliance and Secure Email Gateway products. Immediate updates are urged.

    1–2 minutes
  • Cisco Firepower Firewalls: Next-Gen Protection and Critical Vulnerabilities

    Cisco Firepower Firewalls: Next-Gen Protection and Critical Vulnerabilities

    This article examines Cisco Firepower Firewalls, detailing their next-generation protection capabilities and critical vulnerabilities. It highlights the importance of timely updates as warned by CISA for effective cybersecurity.

    2–3 minutes
  • What is Rhadamanthys Infostealer?

    What is Rhadamanthys Infostealer?

    Rhadamanthys Infostealer compromises digital security by illicitly acquiring sensitive user data. This sophisticated malicious software operates as a Malware-as-a-Service (MaaS), posing a significant threat to individuals and organizations. It facilitates widespread credential theft and financial exploitation. This report examines Rhadamanthys’ operational mechanisms, its propagation methods, and the broader implications of its activities, including recent efforts…

    2–3 minutes
  • What is CitrixBleed 2 (CVE-2025-5777)?

    What is CitrixBleed 2 (CVE-2025-5777)?

    CitrixBleed 2 (CVE-2025-5777) is a critical information-disclosure vulnerability impacting NetScaler ADC and Gateway systems, allowing unauthorized attackers to bypass MFA, hijack admin sessions, and establish unauthorized VDE sessions. This zero-day was exploited by an unnamed APT group before a patch was released.

    2–4 minutes
  • Global Fraud Rings Explained

    Global Fraud Rings Explained

    Global fraud rings are highly organized, transnational criminal enterprises that use intricate networks and sophisticated tactics to illicitly acquire money, assets, or sensitive information from individuals, corporations, and national economies across international borders.

    2–3 minutes