social.coop is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Fediverse instance for people interested in cooperative and collective projects. If you are interested in joining our community, please apply at https://join.social.coop/registration-form.html.

Administered by:

Server stats:

479
active users

#cybersecurity

572 posts291 participants45 posts today

We’ve all made some embarrassing tech flubs, but a recent spate of questionable decisions, including U.S. Secretary of Defense Pete Hegseth’s sharing of top-secret military plans, facilitates this observation: Government officials are kinda bad at tech. @Techcrunch has more on these cautionary tales and how to avoid some of them:

flip.it/C-EkXg

TechCrunch · Government officials are kind of bad at the internet | TechCrunchPerhaps no one in the world has made such catastrophic tech flubs this year as U.S. Secretary of Defense Pete Hegseth. The saga started when the

Via #LLRX @psuPete Recommends Weekly highlights on cyber security issues, 4/26/25 Four highlights from this week: How to prevent your streaming device from tracking your viewing habits (and why it makes a difference); Your private health data may have fueled Google’s ads; Businesses Failing to Prevent Cyber Attacks, Says Report; & How to block Meta AI from using your #Instagram or Facebook posts for training. #cybersecurity #privacy #streaming #Meta #AI #Facebook #google llrx.com/2025/04/pete-recommen

🚨 SAP NetWeaver Zero-Day Under Active Exploitation — Patch Immediately

SAP has released an out-of-band emergency update to fix a critical zero-day vulnerability (CVE-2025-31324) in NetWeaver Visual Composer — and it’s already being exploited in the wild.

The flaw (CVSS 10.0) allows unauthenticated remote attackers to upload malicious files and gain full remote code execution — no login required.

Here’s what’s happening:
- Threat actors are abusing the `/developmentserver/metadatauploader` endpoint
- They're dropping JSP web shells and executing commands directly from browsers
- Post-exploitation activity includes tools like Brute Ratel and MSBuild injection for stealth
- Even fully patched systems were compromised — confirming this was a true zero-day

Both ReliaQuest and watchTowr have confirmed active exploitation, with attackers already moving to establish persistence and lateral movement.

Who’s affected:
- SAP NetWeaver Visual Composer 7.50 environments
- Systems exposed to the internet, especially if Visual Composer is enabled

What you need to do:
- Apply the emergency patch from SAP (released after the April 8 update)
- If you can’t patch immediately:
- Restrict access to the vulnerable endpoint
- Disable Visual Composer if unused
- Forward logs to SIEM and scan for unauthorized servlet uploads

Also included in the emergency update:
- CVE-2025-27429 — Code injection in SAP S/4HANA
- CVE-2025-31330 — Code injection in SAP Landscape Transformation

In a world where zero-days are increasingly exploited within hours of discovery, patching isn’t optional — it’s urgent.