#CISA adds CVE-2025-47729 to the #KEV -- which is for the crazy hacked up version of Signal used by high-ranking US government officials. Wowzo. That's something. https://www.cve.org/CVERecord?id=CVE-2025-47729
#CISA ends RSS for #KEV. Sigh.
so close #CISA. image
Welp. Let’s see which way this room goes. image
l feel like i’m going to be using this a lot image
Trying to articulate levels of invasiveness with typical network scanning with metaphors that don't come with the implied violence of "rattling doorknobs." How's this grab you:<li><p>Port Scanning - Waving at passersby, seeing who waves back.</p></li><li><p>Protocol Scanning - Waving and saying "Good morning," noting if the reply is in English, Spanish, or something else.</p></li><li><p>Vulnerability Scanning - Chatting up strangers to see if they'll reveal their birthday.</p></li><li><p>Active Exploitation - Hypnotizing victims into handing over their ATM card and PIN.</p></li>
Archived version of the quoted The Atlantic article is here: https://archive.ph/2025.02.07-140733/https://www.theatlantic.com/technology/archive/2025/02/elon-musk-doge-security/681600/ Unrelated: If you believe there has been an intrusion in a US government system, you are encouraged to report it at
So check it out. KEV data is now available on GitHub, in the proper cisagov organization. I know other people mirror KEV for their projects, but who can say if they're fiddling with it along the way? With , you can rest assured that it's the Real and True mirror of KEV. is still the actual authoritative source, but this GitHub mirror is a pretty close second. I posted about this on [LinkedIn]( ) since that's what people do with work stuff, apparently.
98 KEVs to go until KEV #1337 Hopefully it'll be a good one.
Near as I can tell, the activity around the #Struts2 bug, CVE-2024-53677, is just ham-handed runs of some generalized PoC, and nobody's actually exploiting this yet (since exploitation would be very application/path specific). Most of the news last week was all "exploitation happening, patch and rewrite everything now!" but not seeing any reports of successful (or even possibly successful) this morning. Tell me I'm wrong! (The PoC identified by SANS at https://isc.sans.edu/diary/31520 isn't specific to some particular application -- it's on the user to define upload_endpoint and assumes no auth or session or anything.)