Security Affairs Read, think, share ⌠Security is everyone’s responsibility
- Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacksby Pierluigi Paganini on October 31, 2025 at 6:11 pmCISA warns ransomware gangs exploit CVE-2024-1086, a Linux kernel flaw in netfilter: nf_tables, introduced in 2014 and patched in Jan 2024. CISA warned that ransomware gangs are exploiting CVE-2024-1086, a high-severity Linux kernel flaw introduced in 2014 and patched in January 2024. CISA didnât provide details about the ransomware attacks exploiting the flaw or name 
- EY Exposes 4TB SQL Server Backup Publicly on Microsoft Azureby Pierluigi Paganini on October 31, 2025 at 10:45 amA massive 4TB SQL Server backup file belonging to global accounting giant Ernst & Young (EY) was discovered publicly accessible on Microsoft Azure. Cybersecurity firm Neo Security discovered a 4TB SQL Server backup belonging to accounting giant Ernst & Young (EY) publicly accessible on Microsoft Azure during a routine scan. Neo Securityâs lead researcher identified a 
- Suspected Chinese actors compromise U.S. Telecom firm Ribbon Communicationsby Pierluigi Paganini on October 31, 2025 at 8:52 amA nation-state actor, likely a China-nexus one, hacked the U.S.-based technology company Ribbon Communications. Ribbon Communications is a U.S.-based technology company that provides telecommunications and networking. Ribbon Communications employs approximately 3,052 people as of December 31, 2024. The company reported annual revenue of US $834 million in 2024. The U.S. telecom provider disclosed a cyberattack 
- U.S. CISA adds XWiki Platform, and Broadcom VMware Aria Operations and VMware Tools flaws to its Known Exploited Vulnerabilities catalogby Pierluigi Paganini on October 30, 2025 at 11:14 pmU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds XWiki Platform, and Broadcom VMware Aria Operations and VMware Tools flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA)Â added XWiki Platform, and Broadcom VMware Aria Operations and VMware Tools flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws 
- Brush exploit can cause any Chromium browser to collapse in 15-60 secondsby Pierluigi Paganini on October 30, 2025 at 6:05 pmâBrashâ flaw in Chromiumâs Blink engine lets attackers crash browsers instantly via a single malicious URL, researcher Jose Pino revealed. Security researcher Jose Pino found a severe vulnerability, named Brash, in Chromiumâs Blink rendering engine that can be exploited to crash many Chromium-based browsers within a few seconds. âBrash is a critical vulnerability in Blink, the rendering engine that 
- Ex-Defense contractor exec pleads guilty to selling cyber exploits to Russiaby Pierluigi Paganini on October 30, 2025 at 10:38 amFormer US defense contractor exec Peter Williams pled guilty to stealing trade secrets and selling cyber exploits to a Russian broker, per the US DOJ. Ex-US defense contractor Peter Williams (39) admits stealing US trade secrets and selling cyber exploits to a Russian broker. Williams, an Australian national, pleaded guilty to stealing and selling U.S. 
- Dentsuâs US subsidiary Merkle hit by cyberattack, staff and client data exposedby Pierluigi Paganini on October 30, 2025 at 8:21 amDentsu said its U.S. unit Merkle was hit by a cyberattack exposing staff and client data, forcing some systems offline to mitigate the security breach. Japanese multinational advertising and public relations company Dentsu, one of the largest marketing agencies in the world, announced that its U.S.-based subsidiary Merkle suffered from a cyber attack that exposed 
- Hacktivists breach Canadaâs critical infrastructure, cyber Agency warnsby Pierluigi Paganini on October 29, 2025 at 8:54 pmCanadaâs cyber agency warns hacktivists breached critical infrastructure, altering industrial controls and risking public safety. The Canadian Centre for Cyber Security revealed that hacktivists have repeatedly breached systems of countryâs critical infrastructure systems in the country. Attackers tampered with industrial controls at a water treatment facility, an oil & gas firm, and an agricultural facility. 
- Russian hackers, likely linked to Sandworm, exploit legitimate tools against Ukrainian targetsby Pierluigi Paganini on October 29, 2025 at 2:56 pmRussian actors, likely linked to Sandworm, targeted Ukrainian firms using LotL tactics and dual-use tools to steal data and stay hidden, says Symantec and Carbon Black. Russian threat actors, likely linked to the APT Sandworm, targeted Ukrainian organizations to steal sensitive data and maintain long-term network access, Symantec Threat Hunter Team and Carbon Black report. 
- U.S. CISA adds Dassault Systèmes DELMIA Apriso flaws to its Known Exploited Vulnerabilities catalogby Pierluigi Paganini on October 29, 2025 at 8:39 amU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Dassault Systèmes DELMIA Apriso flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Oracle, Windows, Kentico, and Apple flaws to its Known Exploited Vulnerabilities (KEV) catalog. Dassault Systèmes DELMIA Apriso is a Manufacturing Operations Management (MOM) and Manufacturing Execution System (MES) platform. 

 
			




