CVE Alert: CVE-2025-2572 - https://www.redpacketsecurity.com/cve_alert_cve-2025-2572/

CVE Alert: CVE-2025-2572 - https://www.redpacketsecurity.com/cve_alert_cve-2025-2572/
CVE Alert: CVE-2025-3570 - https://www.redpacketsecurity.com/cve_alert_cve-2025-3570/
CVE Alert: CVE-2025-32931 - https://www.redpacketsecurity.com/cve_alert_cve-2025-32931/
CVE Alert: CVE-2025-1782 - https://www.redpacketsecurity.com/cve_alert_cve-2025-1782/
CVE Alert: CVE-2022-43840 - https://www.redpacketsecurity.com/cve_alert_cve-2022-43840/
CVE Alert: CVE-2025-3585 - https://www.redpacketsecurity.com/cve_alert_cve-2025-3585/
CVE Alert: CVE-2022-43847 - https://www.redpacketsecurity.com/cve_alert_cve-2022-43847/
CVE Alert: CVE-2022-43850 - https://www.redpacketsecurity.com/cve_alert_cve-2022-43850/
New IP set detected for DDosia.
New configuration detected for DDosia. Hosts:
* pks.pl
* pkspolonus.pl
* biznes.pocztowy.pl
* www.aliorbank.pl
* www.pekao.com.pl
* www.ipkobiznes.pl
* www.pekao24.pl
* online.pocztowy.pl
* www.port.gdynia.pl
* www.pocztowy.pl
* www.portgdansk.pl
* www.erzeszow.pl
* www.pkobp.pl
* www.portpolice.pl
* www.mpk.poznan.pl
* bip.erzeszow.pl #ThreatIntel #Ddosia #NoName
* https://witha.name/data/2025-04-15_09-05-03_DDoSia-target-list-full.json
* https://witha.name/data/2025-04-15_09-05-03_DDoSia-
Freshly published analysis of BRICKSTORM backdoor samples, now on Windows, identified in a multi-year espionage campaign attributed to the PRC: https://www.nviso.eu/blog/nviso-analyzes-brickstorm-espionage-backdoor
Just a reminder: our free MISP online training is happening tomorrow, Wednesday.
New configuration detected for DDosia. Hosts:
* www.aliorbank.pl
* biznes.pocztowy.pl
* www.pekao24.pl
* www.mpk.poznan.pl
* online.pocztowy.pl
* 212.85.105.223
* www.pekao.com.pl
* pks.pl
* www.pocztowy.pl
* www.portpolice.pl
* www.ipkobiznes.pl
* www.pkobp.pl
* www.port.gdynia.pl
* www.erzeszow.pl
* pkspolonus.pl
* www.portgdansk.pl
* bip.erzeszow.pl #ThreatIntel #Ddosia #NoName
* https://witha.name/data/2025-04-15_08-05-02_DDoSia-target-list-full.json
*
Palo Alto Networks confirms brute-force login attacks on GlobalProtect portals, linked to recent scanning surges. Stay safe: Update PAN-OS, enforce MFA, and block attack patterns.
CVE Alert: CVE-2022-43852 - https://www.redpacketsecurity.com/cve_alert_cve-2022-43852/
CVE Alert: CVE-2022-43851 - https://www.redpacketsecurity.com/cve_alert_cve-2022-43851/
CVE Alert: CVE-2025-3589 - https://www.redpacketsecurity.com/cve_alert_cve-2025-3589/