Edited. Thanks!
2
Guardarian Users Targeted With Malicious Strapi NPM Packages - SecurityWeek
(www.securityweek.com)
13
Hackers Weaponize Claude Code Leak to Spread Vidar and GhostSocks Malware
(cybersecuritynews.com)
17
Hackers Using Fake "Microsoft Teams" Domains to Attack Users Via Malicious Payload
(cybersecuritynews.com)
6
A Vulnerability in Fortinet FortiClientEMS Could Allow for Arbitrary Code Execution
(www.cisecurity.org)
Sorry. It was not paywalled for me when I first saw. More info from different source: https://feedly.com/cve/CVE-2025-6545
The incident occurred on June 12, 2025, due to a policy change that contained blank fields, causing 503 errors in Google Cloud and Google Workspace APIs. The root cause was:
- A new feature added to Service Control on May 29, 2025, without adequate error handling.
- The policy change with blank fields was globally replicated and caused Service Control binaries to crash.
Thanks! Corrected
The first vulnerability, CVE-2025-5054, affects Ubuntu’s Apport crash reporting system, while the second, CVE-2025-4598, impacts systemd-coredump, the default core dump handler used across Red Hat Enterprise Linux 9 and 10, as well as Fedora distributions.
Leak extortion is the main issue nowadays, not covered by backups, I'm afraid.
!selfhosted@lemmy.world to the win!
view more: next ›
Done, thanks!