ioc.exchange is one of the many independent Mastodon servers you can use to participate in the fediverse.
INDICATORS OF COMPROMISE (IOC) InfoSec Community within the Fediverse. Newbies, experts, gurus - Everyone is Welcome! Instance is supposed to be fast and secure.

Administered by:

Server stats:

1.5K
active users

#cybersecurity

1.9K posts491 participants78 posts today

Ars Technica: Google: Governments are using zero-day hacks more than ever. “Last year was big for zero-day exploits, security threats that appear in the wild before vendors have a chance to develop patches. Through its sprawling network of services and research initiatives, Google is the first to spot many of these threats. In a new report from the Google Threat Intelligence Group (GTIG), the […]

https://rbfirehose.com/2025/04/30/google-governments-are-using-zero-day-hacks-more-than-ever-ars-technica/

ResearchBuzz: Firehose | Individual posts from ResearchBuzz · Google: Governments are using zero-day hacks more than ever (Ars Technica) | ResearchBuzz: Firehose
More from ResearchBuzz: Firehose

Broadcom Brocade Fabric SAN vulnerability actively exploited

CISA has warned that a critical vulnerability in Broadcom's Brocade Fabric OS (CVE-2025-1976, CVSS 8.6) is being actively exploited, allowing authenticated administrators to execute arbitrary code with root privileges by exploiting improper input validation in IP address handling. Affected organizations are urged to upgrade to version 9.1.1d7 or later immediately.

**If you are running Broadcom Brocade Fabric OS systems, start a quick patch cycle. Isolation won't work here because the exploit relies on trusted users because it does require access with admin privileges. Yet it's already exploited, so attackers have found a way to the admin user. Your only bet is to patch your Broadcom systems.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

BeyondMachinesBroadcom Brocade Fabric SAN vulnerability actively exploitedCISA has warned that a critical vulnerability in Broadcom's Brocade Fabric OS (CVE-2025-1976, CVSS 8.6) is being actively exploited, allowing authenticated administrators to execute arbitrary code with root privileges by exploiting improper input validation in IP address handling. Affected organizations are urged to upgrade to version 9.1.1d7 or later immediately.

🚨 Last Call to Register! 🚨

Don’t miss your chance to be part of OWASP Global AppSec EU 2025 in beautiful Barcelona!

Join security leaders, developers, and researchers from around the world for cutting-edge sessions, hands-on trainings, and unbeatable networking opportunities.

📅 May 27–31, 2025
📍 Barcelona, Spain

🔗 owasp.glueup.com/event/123983/

Secure your spot and be part of the future of application security!