company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Vulnerability

Atlassian

RCE

loading..
loading..
loading..

Critical Remote Code Execution Vulnerability in Old Atlassian Confluence

Stay secure with Atlassian! Learn about the critical CVE-2023-22527 vulnerability in Confluence. Immediate patching. #AtlassianSecurity

17-Jan-2024
5 min read

No content available.

Related Articles

loading..

Gafna

Authentication bypass vulnerability, CVE-2025-41115 (CVSS 10.0), allows unauthen...

Grafana has escalated a security alert to critical status, disclosing CVE-2025-41115, a maximum-severity authentication spoofing flaw. The vulnerability lies in the core identity-extraction logic of Grafana’s SAML and JWT authentication integrations. Specifically, the flaw enables a remote, unauthenticated attacker to inject arbitrary identity headers, effectively allowing them to masquerade as any user in the system by forging the `X-Grafana-User` header. This includes assuming the privileges of Grafana instance administrators, leading to a complete compromise of the Grafana environment and any integrated data sources. **Technical Mechanism: Header Manipulation and Trust Violation** The exploit chain is deceptively simple, highlighting a critical failure in the enforcement of trust boundaries. When Grafana is configured to use SAML or JWT authentication, it relies on HTTP headers passed from a reverse proxy or identity provider to identify the user. 1. **The Flaw:** The authentication logic improperly trusts user-supplied values for the header used to designate the authenticated user's identity (e.g., `X-WEBAUTH-USER`). An attacker can directly craft an HTTP request containing a spoofed header, such as `X-Grafana-User: admin`. 2. **The Bypass:** Grafana's backend, failing to validate the provenance and integrity of this header against the actual authenticated session or token, accepts the forged identity. This results in the attacker being granted a session with the targeted user's privileges. 3. **The Impact:** Successful exploitation grants an attacker the same level of access as the spoofed user. With admin rights, they can view all dashboards and data sources, exfiltrate sensitive data, modify data source configurations, and create or delete users, effectively owning the Grafana instance. **Intersection with SCIM Provisioning: An Amplification Vector** This vulnerability directly undermines the security model of System for Cross-domain Identity Management (SCIM) provisioning. SCIM, used for automated user lifecycle management, relies on the integrity of admin-level authentication to create, modify, or deactivate users. * **Compromise Scenario:** An attacker exploiting CVE-2025-41115 to spoof a SCIM administrator could manipulate the entire user base. They could deactivate legitimate administrators, create new admin accounts for persistence, or alter user roles, leading to a permanent and difficult-to-trace backdoor into the enterprise user directory as managed by Grafana. **Mitigation and Immediate Action Required** Grafana Labs has released patched versions for all affected branches: 11.3.9, 10.4.17, and 9.5.21. The remediation is non-negotiable. 1. **Patching:** Upgrade Grafana instances to the patched versions immediately. This is the primary and most effective mitigation. 2. **Configuration Hardening:** For organizations unable to patch instantly, a critical workaround involves configuring the reverse proxy (e.g., Nginx, Apache) to strip the implicated headers (`X-Grafana-User`, `X-WEBAUTH-USER`, etc.) from all **incoming** client requests before they reach the Grafana backend. These headers should only be set internally by the proxy itself based on validated authentication tokens from a trusted IdP. CVE-2025-41115 is not a mere bug; it is a fundamental design flaw in Grafana's external authentication trust model. Its CVSS 10.0 score is warranted, as it provides a direct, low-complexity path for a network-based attacker to escalate from unauthenticated to complete administrative control. The intersection with SCIM transforms a severe instance compromise into a potential identity governance disaster. Security teams must treat this as a top-priority remediation event, prioritizing patching above all other non-critical maintenance tasks.

loading..   21-Nov-2025
loading..   3 min read
loading..

WhatsApp

Trustwave SpiderLabs exposes a sophisticated Android banking Trojan, "SpyNote," ...

Cyber threats exploit human trust. Trustwave SpiderLabs has uncovered a new, highly effective distribution campaign for the **SpyNote Android banking Trojan**. Masquerading as a critical "WhatsApp Update," this malware leverages the platform's immense credibility to bypass user skepticism and deploy a full-featured spying and financial-theft tool directly on victim devices. The campaign, detailed in a recent threat intelligence report, demonstrates a shift from less-personalized distribution methods to highly targeted social engineering, marking a significant evolution in the mobile threat landscape. #### **A Multi-Stage Social Engineering Assault** The attack begins not with a technical exploit, but with a persuasive lie. Victims receive a message, typically via SMS or another platform, urging them to update WhatsApp by clicking a provided link. This sense of urgency and the use of a trusted brand name is the critical first step in bypassing initial defenses. 1. **The Lure:** The victim is directed to a phishing page that convincingly mimics the official WhatsApp website, complete with branding and a prominent "Update" button. 2. **The Payload:** Clicking the button downloads a malicious APK file (`api[.]whatsapp[.]com/update_whatsapp.apk`). This file is the SpyNote banking Trojan, digitally signed with a seemingly legitimate certificate to evade basic checks. The user must enable "Install from Unknown Sources," a step the social engineering context makes them more likely to accept. 3. **The Permissions Grab:** Once installed, the app, disguised with a generic "Settings" icon and name, requests extensive Android permissions. Crucially, it abuses the Accessibility Service—a powerful feature intended to aid users with disabilities—to grant itself additional permissions without user interaction, effectively neutering Android's standard security prompts. #### **Beyond Simple Banking Theft** SpyNote (detected by SpiderLabs as `Android.SpyNote`) is not a simple information stealer; it's a modular RAT (Remote Access Trojan) with a comprehensive suite of spying capabilities designed for persistent control and data exfiltration. Key malicious functionalities include: * **Overlay Attacks:** The Trojan dynamically injects fake login screens over legitimate banking and social media applications, capturing credentials in real-time as the user enters them. * **SMS Interception & Theft:** It can read, send, and block SMS messages. This is critical for intercepting one-time passwords (OTPs) and two-factor authentication (2FA) codes used by banks. * **Call Redirection & Recording:** The malware can redirect incoming calls and record both sides of a conversation, providing attackers with a direct audio intelligence feed. * **Keylogging:** By abusing the Accessibility Service, it can log every keystroke made on the infected device, capturing usernames, passwords, and private messages. * **Remote Control (RAT):** Attackers can remotely trigger these functions, access the device's file system, and even use the camera and microphone, turning the smartphone into a full-fledged surveillance device. * **Payload Update Capability:** The malware can communicate with its Command and Control (C2) server to download and execute additional malicious payloads, ensuring its functionality can evolve post-infection. #### **Why This Campaign is So Effective** This campaign's success lies in its psychological precision. By hijacking the WhatsApp brand—a service used by billions for personal and professional communication—attackers create a powerful cognitive bias. The fear of missing out on critical updates or functionality overrides the natural caution associated with installing unknown apps. Furthermore, the use of a digitally signed APK and the abuse of legitimate Android features like the Accessibility Service represent a "living-off-the-land" technique for mobile malware, making it harder for traditional security solutions to distinguish malicious from legitimate behavior. #### **Mitigation & Defense Recommendations** For enterprises and individuals, a proactive, defense-in-depth strategy is essential. **For End-Users:** * **Never install apps from unofficial sources.** Only use the Google Play Store or official enterprise app stores. * **Be inherently skeptical of unsolicited update links,** especially those received via SMS or email. Navigate to the official app store directly to check for updates. * **Scrutinize app permissions critically.** If an app, especially one claiming to be a simple utility, requests Accessibility Service permissions or SMS access, it is a major red flag. * **Keep "Install Unknown Apps" disabled for all browsers and messaging apps.** **For Enterprises (via EMM/MDM):** * Enforce policies that block the installation of applications from unknown sources on all corporate-managed devices. * Implement application allow-listing to restrict which apps can run on enterprise devices. * Deploy a modern Mobile Threat Defense (MTD) solution capable of detecting malicious behavior, such as the abuse of Accessibility Services and the presence of overlay attacks. * Conduct ongoing user awareness training focused on mobile social engineering tactics. The SpyNote campaign is a potent indicator that mobile banking Trojans are becoming more sophisticated, not just in their code, but in their delivery. In an era where the smartphone is a digital vault, vigilance is the first and most important line of defense.

loading..   19-Nov-2025
loading..   4 min read
loading..

Cloudflare

Cloudflare global outage root cause analysis. Configuration error triggered casc...

Imagine every fifth website you use—from banking to social media—simultaneously vanishing. On November 18, 2025, that digital nightmare became reality. A catastrophic Cloudflare outage didn’t just cause errors; it triggered a **multi-billion dollar global digital seizure**, exposing the terrifying fragility of our hyper-centralized internet. For three hours, the **digital heartbeat of the global economy flatlined**. This wasn’t a hack; it was a **catastrophic internal chain reaction**—a silent bug triggered by a routine file update, spiraling into a worldwide web-wide collapse. ### One File That Broke the Modern Internet The crisis began at 11:20 UTC. Deep within Cloudflare's core infrastructure, a configuration file for its advanced Bot Management system—a critical shield against cyber threats—swelled beyond its designed capacity. This single file, bloated with data, crashed a primary software system. The result? A **digital pandemic** that spread across Cloudflare's global network in minutes. Their own internal controls were locked out, turning a technical failure into an uncontrollable cascade. The internet's most trusted guardian had accidentally become its single point of failure. ### Your Daily Digital Life, Gone The outage didn't discriminate. It was a **universal digital blackout** that touched every corner of the online world, making its impact instantly, virally relatable: * **Your AI Brain Vanished:** ChatGPT went dark. Claude AI was unresponsive. The very tools reshaping our workflow were suddenly useless. * **Your Social Feed Went Blank:** X (Twitter) errored out, silencing global conversation. * **Your Shopping Cart Evaporated:** Shopify stores disappeared, freezing e-commerce at the point of sale. * **Your Lunch Was Canceled:** DoorDash and Uber Eats apps failed, leaving orders and drivers in limbo. * **Your Commute Was Halted:** New Jersey Transit's systems were impacted, stranding passengers. * **Your Playlist Died:** Spotify streams cut out. League of Legends and Valorant servers kicked players offline. This wasn't a list of affected services; it was the **erasure of daily digital routines** for millions. ### Billions Evaporated in Hours The real shockwave was economic. As screens flickered with error messages, the financial bleed began in real-time. Expert analysts projected a jaw-dropping loss of **$5 to $15 billion for every hour** the internet remained broken. This wasn't just an outage; it was one of the most expensive infrastructure failures in history, a stark reminder that the "cloud" is, in fact, a very physical and vulnerable economic engine. ### A Fragile Digital House of Cards The November 18th crash is a **deafening wake-up call**. It proves that our move to a convenience-driven, centralized web has created a house of cards. When one player like Cloudflare, which powers an estimated 20% of all websites, stumbles, the entire digital world falls. The internet recovered, but the trust in its resilience is forever fractured. The question now echoing through boardrooms and governments is no longer *if* this will happen again, but how we can rebuild a web that isn't forever one misstep away from its next global blackout.

loading..   18-Nov-2025
loading..   3 min read