![]() |
Description: Haor Heavy Transport Hacked Few outside the region have heard of Haor, an unassuming overland transport company operating under the Israeli flag. But beneath the surface of shipping manifests and logistics data lies something less routine. Convoys move at odd hours. Routes shift without notice. And some cargo,sealed, unregistered,never appears on official records. Those who…
June 19th, 2025 (4 days ago)
|
![]() |
Description: Siamgas and Petrochemicals Public Company Limited, together with its subsidiaries, trades in petroleum and petrochemical products in Thailand and internationally. It operates through Petroleum and Petrochemical Products, Transportation Services, and Other segments
June 19th, 2025 (4 days ago)
|
![]() |
Description: Great Lakes Wholesale Group is a retail store supplier providing quality wholesale Health & Beauty, Household, General Merchandise, OTC, Pet, Grocery and other wholesale merchandise for local, national and international discount, convenience ...
June 19th, 2025 (4 days ago)
|
CVE-2025-52464 |
Description: Meshtastic is an open source mesh networking solution. In versions from 2.5.0 to before 2.6.11, the flashing procedure of several hardware vendors was resulting in duplicated public/private keys. Additionally, the Meshtastic was failing to properly initialize the internal randomness pool on some platforms, leading to possible low-entropy key generation. When users with an affected key pair sent Direct Messages, those message could be captured and decrypted by an attacker that has compiled the list of compromised keys. This issue has been patched in version 2.6.11 where key generation is delayed til the first time the LoRa region is set, along with warning users when a compromised key is detected. Version 2.6.12 furthers this patch by automatically wiping known compromised keys when found. A workaround to this vulnerability involves users doing a complete device wipe to remove vendor-cloned keys.
CVSS: CRITICAL (9.5) EPSS Score: 0.05%
June 19th, 2025 (4 days ago)
|
CVE-2025-49014 |
Description: jq is a command-line JSON processor. In version 1.8.0 a heap use after free vulnerability exists within the function f_strflocaltime of /src/builtin.c. This issue has been patched in commit 499c91b, no known fix version exists at time of publication.
CVSS: MEDIUM (5.5) EPSS Score: 0.04%
June 19th, 2025 (4 days ago)
|
![]() |
Description: AFECC Hospital Santa Rita Falls Victim to INC RANSOM Ransomware
June 19th, 2025 (4 days ago)
|
![]() |
Description: Alleged Data Leak of Argentinian Driving Licenses
June 19th, 2025 (4 days ago)
|
![]() |
Description: A civil forfeiture complaint was filed in U.S. District Court for the District of Columbia this week, where investigators from the FBI and U.S. Secret Service said they used blockchain analysis to trace the funds back to fraud schemes perpetrated by actors in the Philippines.
June 19th, 2025 (4 days ago)
|
![]() |
Description: Saban Systems Hacked Saban Systems, has quietly become a central player in Israel’s expanding surveillance infrastructure. Through undisclosed agreements with Shin Bet, the nation’s internal security agency, Saban Systems has been tasked with the deployment of high-grade surveillance cameras across both public and classified sectors. The operation, internally referred to as “Silent Horizon,” involves not…
June 19th, 2025 (4 days ago)
|
![]() |
Description: ChatGPT's next big upgrade, or the new foundational model "GPT-5," is still being prepared for a release in the summer, but OpenAI won't share the specifics. [...]
June 19th, 2025 (4 days ago)
|