This newsletter highlights various recent security breaches and critical vulnerabilities affecting major organizations like DBS Group, Oracle, Europcar, and more. It emphasizes the increasing trend of supply chain attacks, challenges posed by legacy systems, and the need for vigilant vendor security assessments. Affected: DBS Group, Bank of China, Oracle Cloud, Europcar Mobility Group, State Bar of Texas, Port of Seattle, Google Gemini, Microsoft Windows, Linux Kernel, Apache Tomcat, reviewdog/action-setup, Chromium, Juniper Junos OS, Apple WebKit
Keypoints :
- Multiple significant breaches reported, including ransomware attacks and data exposure.
- DBS Group and Bank of China faced ransomware attacks compromising customer data.
- Oracle Cloud disclosed a breach in its legacy environment with stolen client credentials.
- Europcar Mobility Groupβs source code and customer information were exposed in a GitLab breach.
- The State Bar of Texas suffered ransomware access with exposed legal documents.
- The Port of Seattle faced a ransomware attack, compromising data of 90,000 individuals.
- Researchers successfully extracted internal binaries from Google Gemini without sandbox breaches.
- Several critical CVEs identified in popular software like Microsoft Windows and Apache Tomcat.
- Deepseek reportedly restricts employee travel amid AI security concerns.
MITRE Techniques :
- TA0007 β Exploit Public-Facing Application: The ransomware attacks targeted vulnerabilities within third-party vendors.
- TA0020 β External Remote Services: Attacks exploited access points from external vendors and legacy systems.
- TA0001 β Initial Access: Compromised credentials were shared on hacking forums to gain initial access.
- TA0040 β Impact: Data was exfiltrated or encrypted, particularly from major organizations like DBS and Oracle.
- TA0042 β Resource Development: Use of stolen confidential information for unauthorized development or access protocols, noted in Google Gemini research.
Indicator of Compromise :
- [Domain] tpnnexttech.com
- [Email] [email protected] (generic example from hacking discussions)
- [CVE] CVE-2025-29824
- [CVE] CVE-2024-53197
- [CVE] CVE-2025-2783
Views: 13