CVE-2025-24054, NTLM Exploit in the Wild

Key Points CVE-2025-24054 is a vulnerability related to NTLM hash disclosure via spoofing, which can be exploited using a maliciously crafted .library-ms file. Active exploitation in the wild has been observed since March 19, 2025, potentially allowing attackers to leak NTLM hashes or user passwords and compromise systems. Although Microsoft released a patch on March…

Read More

21st April – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 21st April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Retail giant Ahold Delhaize has suffered a cyber-attack resulting in data theft of customer information from its US business systems. The attack, claimed by ransomware group INC Ransom, impacted Ahold Delhaize USA…

Read More

WordPress User Registration & Membership Plugin 4.1.2 – Authentication Bypass

#!/usr/bin/env python3 # Exploit Title: WordPress User Registration & Membership Plugin 4.1.2 – Authentication Bypass # Date: 2025-05-22 # Exploit Author: Mohammed Idrees Banyamer # Vendor Homepage: https://wordpress.org/plugins/user-registration/ # Software Link: https://downloads.wordpress.org/plugin/user-registration.4.1.2.zip # Version: <= 4.1.2 # Tested on: WordPress 6.x, Apache on Linux # CVE: CVE-2025-2594 import requests import sys import argparse from…

Read More

28th April – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 28th April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES British retailer Marks & Spencer (M&S) experienced a cyber-attack that caused disruptions to its online order system and in-store contactless payments. The company suspended online orders temporarily, refunded some customers, and reported…

Read More

New Release: Tor Browser 14.5.1

Tor Browser 14.5.1 is now available from the Tor Browser download page and also from our distribution directory. This version includes important security updates to Firefox. Send us your feedback If you find a bug or have a suggestion for how we could improve this release, please let us know. Full changelog The full changelog…

Read More

The State of AI in Cyber Security

Artificial intelligence is rapidly reshaping the cyber security landscape—but how exactly is it being used, and what risks does it introduce? At Check Point Research, we set out to evaluate the current AI security environment by examining real-world threats, analyzing how researchers and attackers are leveraging AI, and assessing how today’s security tools are evolving…

Read More

Windows 2024.15 – Unauthenticated Desktop Screenshot Capture

# Exploit Title: Windows 2024.15 – Unauthenticated Desktop Screenshot Capture # Date: 2025-05-19 # Exploit Author: Chokri Hammedi # Vendor Homepage: https://rs.ltd # Software Link: https://rs.ltd/latest.php?os=win # Version: 2024.15 # Tested on: Windows 10/11 with Remote for Windows (helper) ”’ Description: – Exploits the getScreenshot API endpoint in Remote for Windows helper service -…

Read More

MICI NetFax Server Product Vulnerabilities (NOT FIXED)

Last updated at Fri, 30 May 2025 18:47:35 GMT In the course of a penetration testing engagement, Rapid7 discovered three vulnerabilities in MICI Network Co., Ltd’s NetFax server versions < 3.0.1.0. These issues allowed for an authenticated attack chain resulting in Remote Code Execution (RCE) against the device as the root user. While authentication is…

Read More

New Release: Tails 6.15 | The Tor Project

Changes and updates Update Tor Browser to 14.5.1. Update the Linux kernel to 6.1.135. Fixed problems Make sure Tails cannot store data in UEFI variables or ACPI tables when crashing. (#20813) Fix the appearance of the GRUB Boot Loader with Secure Boot. (#20899) For more details, read our changelog. Known issues Remove firmware for the…

Read More