"##ss score of 9. 8, that can be chained for unauthenticated remote code execution. the flaws let attackers reach restricted configuration pages and upload arbitrary files to the server without logging in to affected installations. f5 reclassified cve - 2025 - 53521, a big - ip ac…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
81%
"municipalities and using tor and vpn infrastructure to evade geofencing and complicate attribution. check point research have uncovered coordinated tax - season phishing and malware activity, with hundreds of newly registered tax - themed domains and rising risk levels. in march …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
39%
"engine that could let attackers extract service agent credentials and pivot into customer projects. the exposed privileges enabled access to storage and artifact registry resources, and permissive oauth scopes also increased the risk of wider google workspace exposure. vulnerabil…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
For the latest discoveries in cyber research for the week of 30th March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The European Commission, the European Union’s executive body, has confirmed a data breach after its Europa.eu platform was compromised through a third-party exchange linked to the Trivy supply chain attack. The incident […]