11Articles
6Categories
2025-03-18Date
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2025-24472 Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability CVE-2025-30066 tj-actions/changed-files GitHub Action Embedde…
KEV
🚨
Supply Chain Compromise of Third-Party tj-actions/changed-files (CVE-2025-30066) and reviewdog/action-setup@v1 (CVE-2025-30154)A popular third-party GitHub Action, tj-actions/changed-files (tracked as CVE-2025-30066 ), was compromised. tj-actions/changed-files is designed to detect which files have changed in a pull request or commit. The supply chain compromise allows for information disclosure of secre…
KEV
⚠️
A Vulnerability in Apache Tomcat Could Allow for Remote Code Execution
⚠️
156: Kill List
⚠️
CISA Releases Seven Industrial Control Systems Advisories
⚠️
ZDI-CAN-25373: Windows Shortcut Exploit Abused as Zero-Day in Widespread APT Campaigns
📢
CISA Probationary Reinstatements
🕵️
SOC and Awe — How Autonomous Security Is Changing the Game
🕵️
Darknet Diaries Ep 156: Kill List
🌐
Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor
📡
MirrorFace updates toolset, expands targeting to Europe