Image 1 Apple Backports Zero-Day Patches to Older iPhones and Macs

Posted: 2025/04/01
Source: Bleeping Computer
Tag(s): Headline, Phone, Flaw, Patch, Apple, 0 Day
Image 1 CISA Spots Spawn of Spawn Malware Targeting Ivanti Flaw

Posted: 2025/04/01
Source: The Register
Tag(s): Headline, Government, Malware, USA, Flaw
Image 1 WordPress Attackers Hide Malware in Overlooked Plugins Directory

Posted: 2025/04/01
Source: SC Magazine
Tag(s): Headline, Malware, Flaw, WordPress, Backdoor
Image 1 DOGE Accesses Federal Payroll System and Punishes Employees Who Objected

Posted: 2025/04/01
Source: ars technica
Tag(s): Headline, Government, Privacy, USA, Data Loss
Image 1 Critical Auth Bypass Bug in CrushFTP Now Exploited in Attacks

Posted: 2025/04/01
Source: Bleeping Computer
Tag(s): Headline, Hacker, Flaw
Image 1 Cyber Attacks to Remain a National Emergency Event in the US

Posted: 2025/04/01
Source: SC Magazine
Tag(s): Headline, Government, USA, Cyberwar, Military
Image 1 GCHQ Intern Took Top Secret Spy Tool Home, Now Faces Prison

Posted: 2025/04/01
Source: The Register
Tag(s): Headline, Government, Britain, Data Loss, Spyware
Image 1 Retail Giant Sam's Club Investigates Clop Ransomware Breach Claims

Posted: 2025/03/31
Source: Bleeping Computer
Tag(s): Headline, Hacker, Malware, Data Loss, Cryptography
Image 1 Kink and LGBT Dating Apps Exposed 1.5m Private User Images Online

Posted: 2025/03/31
Source: BBC News UK
Tag(s): Headline, Privacy, Data Loss
Image 1 OpenAI Offering $100k Bounties for Critical Vulnerabilities

Posted: 2025/03/31
Source: Security Week
Tag(s): Headline, Hacker, Botnet, Flaw
Image 1 Apple Backports Zero-Day Patches to Older iPhones and Macs

Posted: 2025/04/01
Source: Bleeping Computer
Tag(s): Headline, Phone, Flaw, Patch, Apple, 0 Day
Image 1 CISA Spots Spawn of Spawn Malware Targeting Ivanti Flaw

Posted: 2025/04/01
Source: The Register
Tag(s): Headline, Government, Malware, USA, Flaw
Image 1 WordPress Attackers Hide Malware in Overlooked Plugins Directory

Posted: 2025/04/01
Source: SC Magazine
Tag(s): Headline, Malware, Flaw, WordPress, Backdoor
Image 1 DOGE Accesses Federal Payroll System and Punishes Employees Who Objected

Posted: 2025/04/01
Source: ars technica
Tag(s): Headline, Government, Privacy, USA, Data Loss
Image 1 Critical Auth Bypass Bug in CrushFTP Now Exploited in Attacks

Posted: 2025/04/01
Source: Bleeping Computer
Tag(s): Headline, Hacker, Flaw
Image 1 Cyber Attacks to Remain a National Emergency Event in the US

Posted: 2025/04/01
Source: SC Magazine
Tag(s): Headline, Government, USA, Cyberwar, Military
Image 1 GCHQ Intern Took Top Secret Spy Tool Home, Now Faces Prison

Posted: 2025/04/01
Source: The Register
Tag(s): Headline, Government, Britain, Data Loss, Spyware
Image 1 Retail Giant Sam's Club Investigates Clop Ransomware Breach Claims

Posted: 2025/03/31
Source: Bleeping Computer
Tag(s): Headline, Hacker, Malware, Data Loss, Cryptography
Image 1 Kink and LGBT Dating Apps Exposed 1.5m Private User Images Online

Posted: 2025/03/31
Source: BBC News UK
Tag(s): Headline, Privacy, Data Loss
Image 1 OpenAI Offering $100k Bounties for Critical Vulnerabilities

Posted: 2025/03/31
Source: Security Week
Tag(s): Headline, Hacker, Botnet, Flaw

Storm Watch ()

2025-04-01: 7 news articles added
2025-04-01: 22 files added
2025-03-03: 1 voting poll added

2025-03-20 (1742428800)

Discovered an overly aggressive expiration check causing production API keys to disappear from view. It has been addressed. Fixed up advertisement/api managers to ensure clear visibility and usability. Reach out if there are any issues.


2025-03-12 (1741737600)

Some aesthetic updates have been done to make things a bit cleaner. That said, they were drastic and could very well have broken other things our QA did not find. Shoot us a message at staff@ if you notice anything.

...
[ View Full Changelog ]


Polls ()

Figuring out how to manipulate a flaw to your advantage is at the core of security testing. Different attacks yield different data, but all vectors have their own interesting nuances to exploitation.


What is the most fun to exploit?

AnswersResults
Cross site scripting.0%
SQL injection.8%
Memory-related bugs.8%
Race conditions.0%
People.8%
Code execution / Command injection75%
Storm Watch ()

2025-04-01: 7 news articles added
2025-04-01: 22 files added
2025-03-03: 1 voting poll added

2025-03-20 (1742428800)

Discovered an overly aggressive expiration check causing production API keys to disappear from view. It has been addressed. Fixed up advertisement/api managers to ensure clear visibility and usability. Reach out if there are any issues.


2025-03-12 (1741737600)

Some aesthetic updates have been done to make things a bit cleaner. That said, they were drastic and could very well have broken other things our QA did not find. Shoot us a message at staff@ if you notice anything.

...
[ View Full Changelog ]
Polls ()

Figuring out how to manipulate a flaw to your advantage is at the core of security testing. Different attacks yield different data, but all vectors have their own interesting nuances to exploitation.


What is the most fun to exploit?

AnswersResults
Cross site scripting.0%
SQL injection.8%
Memory-related bugs.8%
Race conditions.0%
People.8%
Code execution / Command injection75%
 About | Terms | Copyright | Privacy | BlueSky | X | Mastodon
 © 2024 - 2025
All Rights Reserved Packet Storm Security, LLC
Hosting provided by: RokaSecurity