Overview
- NVIDIA
- DGX Spark
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
NVIDIA has released a critical DGX Spark firmware update addressing 14 vulnerabilities - including CVE-2025-33187 (CVSS 9.3), which enables malicious code execution and access to protected SoC regions.
Firmware flaws in AI workstations can impact model integrity, training data, and system stability.
Organizations using DGX Spark should patch immediately.
Source: https://cybersecuritynews.com/nvidia-dgx-spark-vulnerabilities/#google_vignette
What’s your view on firmware security in AI-focused hardware?
Follow us for more analysis.
#infosec #NVIDIA #DGXSpark #CVE #AIsecurity #firmwaresecurity #patchnow #securityupdate
Bluesky
Overview
- Digital Bazaar
- node-forge
Description
Statistics
- 2 Posts
Fediverse
Popular Forge Library Receives Fix for Signature Verification Bypass Flaw
Source: https://www.bleepingcomputer.com/news/security/popular-forge-library-gets-fix-for-signature-verification-bypass-flaw/
A high-severity vulnerability in the node-forge package, a widely used JavaScript cryptography library, has been patched after researchers discovered a method to bypass digital signature verification.
Tracked as CVE-2025-12816, the flaw stems from weaknesses in the library’s ASN.1 validation logic. The issue allowed specially crafted, malformed data to pass signature checks despite being cryptographically invalid.
According to an advisory from Carnegie Mellon CERT-CC, the risk varies by implementation but may include:
Authentication bypass
Tampering with signed data
Misuse or manipulation of certificate-related functionality
CERT-CC noted that environments relying heavily on cryptographic verification could face particularly serious consequences.
The potential impact is amplified by the library’s widespread adoption, with nearly 26 million weekly downloads on the NPM registry.
Overview
Description
Statistics
- 2 Posts
Fediverse
Overview
- Studio-42
- elFinder
Description
Statistics
- 1 Post
- 4 Interactions
Fediverse
This is, um, *alot* of coordinated, calculated, automation to see where "elFinder" is.
New CVE/0-Day coming?
Starting the 6-week countdown.
https://viz.greynoise.io/tags/elfinder-2-1-58-rce-cve-2021-32682-check?days=90
Overview
Description
Statistics
- 1 Post
- 3 Interactions
Overview
- Huawei
- HarmonyOS
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
⚠️ CRITICAL: CVE-2025-64314 in Huawei HarmonyOS 5.1.0 enables type confusion attacks via faulty permission controls. Potential for sensitive data exposure—no patch yet. Restrict device access & monitor for updates. https://radar.offseq.com/threat/cve-2025-64314-cwe-843-access-of-resource-using-in-e6e520d9 #OffSeq #Huawei #CVE #Infosec #Vulnerability
Overview
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
#ActuLibre Une faille dans Symfony permet de contourner les règles d'accès - CVE-2025-64500, à lire sur https://security-sensei.fr/posts/20251117-faille-symfony-contournement-regles-acces/ #sécurité #web
Overview
Description
Statistics
- 1 Post
Fediverse
🛑 CRITICAL: CVE-2025-8890 affects SDMC NE6037 routers <7.1.12.2.44. OS command injection via LAN admin portal can lead to full takeover. Patch when available, restrict admin access, and monitor activity! https://radar.offseq.com/threat/cve-2025-8890-cwe-78-improper-neutralization-of-sp-8ed5a589 #OffSeq #Vulnerability #RouterSecurity
Overview
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post
Fediverse
Akira’s SonicWall Exploits Are Disrupting Large Enterprises
Source: https://www.databreachtoday.com/akiras-sonicwall-hacks-are-taking-down-large-enterprises-a-30145
The Akira ransomware group has found a path into large corporate networks by compromising SonicWall SSL VPN devices—hardware typically marketed to small- and medium-sized businesses. Once those firms are acquired by larger enterprises, these devices become high-value entry points for attackers.
Akira began exploiting CVE-2024-40766 between September and December 2024. The flaw was also leveraged by the Fog ransomware group during the same period.
A renewed wave of Akira activity surfaced this past summer, running from late July through at least September. According to Arctic Wolf, the volume and diversity of victims indicate opportunistic mass exploitation, rather than targeted attacks, with impacted organizations spanning multiple industries.