Home » breach » Page 2
Cyberattack disrupting OnSolve CodeRED emergency alert systems used by U.S. public safety agencies

Crisis24’s OnSolve CodeRED Exposes Data and Disrupts Alerts

A cyberattack on Crisis24’s OnSolve CodeRED platform disrupted emergency alerts for cities, counties, police and fire agencies across the U.S. The INC Ransom group claims responsibility, with stolen resident data, clear-text passwords and a rollback to older backups now forcing agencies to rebuild their notification capabilities and review credential hygiene.

Read More
FortiWeb web application firewall exploited via CVE-2025-64446 path traversal to gain administrative command execution using a public PoC tool

PoC Exploit Tool Targets FortiWeb CVE-2025-64446 Path Traversal

A public PoC exploit tool for CVE-2025-64446 now turns FortiWeb WAF appliances into high-value RCE targets. The bug uses a relative path traversal flaw to execute administrative commands over HTTP or HTTPS, and active exploitation in the wild, CISA KEV inclusion, and GitHub tooling mean security teams must urgently patch, lock down management access, and fold FortiWeb into their broader Fortinet and perimeter compromise playbooks.

Read More
AI inference vulnerabilities in Meta, Nvidia, Microsoft and vLLM exposed through ShadowMQ, alongside a Cursor IDE compromise via rogue MCP servers

Serious AI Bugs Expose Meta, Nvidia and Microsoft Inference

Researchers uncovered serious AI bugs across Meta, Nvidia, Microsoft and open-source inference frameworks after tracking a ShadowMQ deserialization pattern built on ZeroMQ and Python pickle. At the same time, new research shows how Cursor’s AI IDE can be hijacked via rogue MCP servers, turning developer workstations into high-value malware delivery platforms if teams ignore AI supply-chain security.

Read More
CISA warns federal agencies to patch Cisco ASA/FTD zero-days and validate compromise under ED 25-03

Cisco firewall zero-days: CISA says patch & retire EOS hardware

CISA warned that multiple federal agencies still haven’t fully patched Cisco ASA/FTD devices despite active exploitation. Because the campaign targets the VPN web server and enables device takeover, teams must apply fixes for CVE-2025-20333/20362, follow ED 25-03 inventory and validation steps, and disconnect end-of-support hardware. This analysis explains impact, attack flow, high-signal detection, and fast remediation so defenders can reduce edge-device risk without slowing operations.

Read More