Overview
- NLnet Labs
- Unbound
Description
Statistics
- 1 Post
Overview
- ray-project
- ray
Description
Statistics
- 1 Post
Fediverse
🚨 CVE-2025-62593 (CRITICAL): Ray AI <2.52.0 is vulnerable to RCE via DNS rebinding attacks (Firefox/Safari). Exploit enables unauthenticated code execution. Patch to 2.52.0+ ASAP! Details: https://radar.offseq.com/threat/cve-2025-62593-cwe-94-improper-control-of-generati-15eefc0a #OffSeq #RayAI #Vuln #Infosec
Overview
- Elated Themes
- FindAll Listing
Description
Statistics
- 1 Post
Fediverse
🚨 CVE-2025-13538 (CRITICAL, CVSS 9.8): Elated Themes FindAll Listing plugin for WordPress lets unauthenticated attackers escalate to admin via registration if FindAll Membership is active. Disable user registration & monitor accounts! https://radar.offseq.com/threat/cve-2025-13538-cwe-269-improper-privilege-manageme-2da30aa5 #OffSeq #WordPress #Infosec
Overview
Description
Statistics
- 1 Post
Bluesky
Overview
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post
Fediverse
Botnet takes advantage of AWS outage to hit 28 countries
https://www.theregister.com/2025/11/26/miraibased_botnet_shadowv2/
A Mirai-based botnet known as ShadowV2 surfaced during last October’s large-scale AWS outage, compromising IoT devices across multiple sectors and regions. Fortinet’s FortiGuard Labs suggests the activity may have been a “test run” for future, more disruptive campaigns.
Once the malware infiltrates vulnerable devices, it assembles them into a distributed network that can be remotely controlled to execute large-scale operations, including distributed denial-of-service (DDoS) attacks.
The botnet spread by exploiting several vulnerabilities affecting devices from multiple vendors, including:
• DD-WRT: CVE-2009-2765
• D-Link: CVE-2020-25506, CVE-2022-37055, CVE-2024-10914, CVE-2024-10915
• DigiEver: CVE-2023-52163
• TBK: CVE-2024-3721
• TP-Link: CVE-2024-53375
These details were outlined by Fortinet antivirus analyst Vincent Li in a Wednesday blog post.
Overview
Description
Statistics
- 1 Post
Fediverse
Botnet takes advantage of AWS outage to hit 28 countries
https://www.theregister.com/2025/11/26/miraibased_botnet_shadowv2/
A Mirai-based botnet known as ShadowV2 surfaced during last October’s large-scale AWS outage, compromising IoT devices across multiple sectors and regions. Fortinet’s FortiGuard Labs suggests the activity may have been a “test run” for future, more disruptive campaigns.
Once the malware infiltrates vulnerable devices, it assembles them into a distributed network that can be remotely controlled to execute large-scale operations, including distributed denial-of-service (DDoS) attacks.
The botnet spread by exploiting several vulnerabilities affecting devices from multiple vendors, including:
• DD-WRT: CVE-2009-2765
• D-Link: CVE-2020-25506, CVE-2022-37055, CVE-2024-10914, CVE-2024-10915
• DigiEver: CVE-2023-52163
• TBK: CVE-2024-3721
• TP-Link: CVE-2024-53375
These details were outlined by Fortinet antivirus analyst Vincent Li in a Wednesday blog post.
Description
Statistics
- 1 Post
Fediverse
Botnet takes advantage of AWS outage to hit 28 countries
https://www.theregister.com/2025/11/26/miraibased_botnet_shadowv2/
A Mirai-based botnet known as ShadowV2 surfaced during last October’s large-scale AWS outage, compromising IoT devices across multiple sectors and regions. Fortinet’s FortiGuard Labs suggests the activity may have been a “test run” for future, more disruptive campaigns.
Once the malware infiltrates vulnerable devices, it assembles them into a distributed network that can be remotely controlled to execute large-scale operations, including distributed denial-of-service (DDoS) attacks.
The botnet spread by exploiting several vulnerabilities affecting devices from multiple vendors, including:
• DD-WRT: CVE-2009-2765
• D-Link: CVE-2020-25506, CVE-2022-37055, CVE-2024-10914, CVE-2024-10915
• DigiEver: CVE-2023-52163
• TBK: CVE-2024-3721
• TP-Link: CVE-2024-53375
These details were outlined by Fortinet antivirus analyst Vincent Li in a Wednesday blog post.
Overview
- D-Link
- DNS-320
Description
Statistics
- 1 Post
Fediverse
Botnet takes advantage of AWS outage to hit 28 countries
https://www.theregister.com/2025/11/26/miraibased_botnet_shadowv2/
A Mirai-based botnet known as ShadowV2 surfaced during last October’s large-scale AWS outage, compromising IoT devices across multiple sectors and regions. Fortinet’s FortiGuard Labs suggests the activity may have been a “test run” for future, more disruptive campaigns.
Once the malware infiltrates vulnerable devices, it assembles them into a distributed network that can be remotely controlled to execute large-scale operations, including distributed denial-of-service (DDoS) attacks.
The botnet spread by exploiting several vulnerabilities affecting devices from multiple vendors, including:
• DD-WRT: CVE-2009-2765
• D-Link: CVE-2020-25506, CVE-2022-37055, CVE-2024-10914, CVE-2024-10915
• DigiEver: CVE-2023-52163
• TBK: CVE-2024-3721
• TP-Link: CVE-2024-53375
These details were outlined by Fortinet antivirus analyst Vincent Li in a Wednesday blog post.
Overview
Description
Statistics
- 1 Post
Fediverse
Botnet takes advantage of AWS outage to hit 28 countries
https://www.theregister.com/2025/11/26/miraibased_botnet_shadowv2/
A Mirai-based botnet known as ShadowV2 surfaced during last October’s large-scale AWS outage, compromising IoT devices across multiple sectors and regions. Fortinet’s FortiGuard Labs suggests the activity may have been a “test run” for future, more disruptive campaigns.
Once the malware infiltrates vulnerable devices, it assembles them into a distributed network that can be remotely controlled to execute large-scale operations, including distributed denial-of-service (DDoS) attacks.
The botnet spread by exploiting several vulnerabilities affecting devices from multiple vendors, including:
• DD-WRT: CVE-2009-2765
• D-Link: CVE-2020-25506, CVE-2022-37055, CVE-2024-10914, CVE-2024-10915
• DigiEver: CVE-2023-52163
• TBK: CVE-2024-3721
• TP-Link: CVE-2024-53375
These details were outlined by Fortinet antivirus analyst Vincent Li in a Wednesday blog post.