ThreatCluster
About Blog Help Contact
Login
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

'MadeYouReset' HTTP/2 flaw lets attackers DoS servers

Threat Score:
59
Theregister
15 hours ago
Part of cluster #1938
'MadeYouReset' HTTP/2 flaw lets attackers DoS servers

Overview

Research 'MadeYouReset' HTTP/2 flaw lets attackers DoS servers Researchers had to notify over 100 vendors of flaw that builds on 2023's Rapid Reset with neat twist past usual mitigations Security researchers Gal Bar Nahum, Anat Bremler-Barr, and Yaniv Harel have published details of a "common design flaw" in implementations of the HyperText Transfer Protocol 2 (HTTP/2) allowing those with ill intent to create "massive Denial of Service attacks". And, being the underpinnings of the modern web, HT...

Continue Reading on Original Site

Related Articles

5 articles
1

Cisco Patches Critical Vulnerability in Firewall Management Platform

SecurityWeek • 1 hour ago

Cisco has released over 20 advisories as part of its August 2025 bundled publication for ASA, FMC and FTD products.

Score
92
Read more
2
Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Brighttalk • 18 hours ago

Presented by Jitin Shabadu, Forrester Analyst | Jayce Nichols, Director, Intelligence Solutions, Google Threat Intelligence Group

Score
83
Read more
3

Open Source Lithium-Titanate Battery Management System

Hackaday • 1 hour ago

Lithium-titanate (LTO) is an interesting battery chemistry that is akin to Li-ion but uses Li2TiO3 nanocrystals instead of carbon for the anode. This makes LTO cells capable of much faster …

Score
83
Read more
4

Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution

The Hacker News • 2 hours ago

Cisco has released security updates to address a maximum-severity security flaw in Secure Firewall Management Center (FMC) Software that could allow an attacker to execute arbitrary code on affected systems. The vulnerability, assigned the CVE identifierCVE-2025-20265(CVSS score: 10.0), affects the RADIUS subsystem implementation that could permit an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device. The networking equipment major said the issue

Score
82
Read more
5

CVE-2025-8088 – WinRAR 0-Day Path Traversal Vulnerability Exploited to Execute Malware

Cybersecurity News • 2 hours ago

A zero-day vulnerability in WinRAR allows malware to be deployed on unsuspecting users’ systems, highlighting the ongoing threats to popular software. Tracked as CVE-2025-8088, this path traversal flaw affects the Windows version of the widely used file archiving tool, enabling attackers to execute arbitrary code through specially crafted archives. The vulnerability, discovered in mid-July 2025, […]

Score
81
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

CVES
CVE-2023-44487
CVE-2025-48989
CVE-2025-54500
CVE-2025-55163
CVE-2025-8671
ATTACK TYPES
Advanced Persistent Threat
Denial of Service
Phishing
Protocol Abuse
Ransomware
VULNERABILITIES
DDoS
Denial of Service
DoS
Protocol Exploitation
Resource Exhaustion
COMPANIES
Apache
Apache Tomcat
Cisco
F5
F5 Networks
AGENCIES
Cybersecurity and Infrastructure Security Agency
NCSC
SECURITY VENDORS
Imperva
Palo Alto Networks
PLATFORMS
Apache
HTTP/2
RANSOMWARE
First
One
QuantumLocker
Rapid
Sodinokibi
MITRE ATT&CK
Phishing
T1003
T1031
T1040
T1055
MALWARE
Industroyer
WannaCryptor
INDUSTRIES
IT Infrastructure
Information Technology
Technology
Web Services
ARTICLE INFORMATION
Article #11610
Published 15 hours ago
Theregister

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration