ThreatCluster
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

‘Critical’ firmware-level vulnerabilities found in laptops commonly used by security specialists

Threat Score:
72
Therecord
14 hours ago
Part of cluster #1702

Overview

According to the research published Tuesday, it is possible for an attacker to break into the ControlVault chip used in many laptops owned by security professionals and modify the firmware inside....

Continue Reading on Original Site

Related Articles

5 articles
1

CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks

Cybersecurity News • 5 hours ago

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert, adding three vulnerabilities affecting D-Link devices to its Known Exploited Vulnerabilities (KEV) Catalog. The inclusion of these flaws in the catalog signifies that they are being actively exploited by malicious cyber actors in real-world attacks, posing a significant threat to networks. The […]

Score
84
Read more
2

SonicWall firewalls hit by active mass exploitation of suspected zero-day

CyberScoop • 8 hours ago

20 organizations have been impacted and the pace of attacks is rising. Threat researchers and SonicWall are scrambling to determine the root cause.

Score
84
Read more
3
Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Brighttalk • 17 hours ago

Presented by Jitin Shabadu, Forrester Analyst | Jayce Nichols, Director, Intelligence Solutions, Google Threat Intelligence Group

Score
83
Read more
4
Risky Bulletin: Russia's war on foreign software continues

Risky Bulletin: Russia's war on foreign software continues

Risky • 6 hours ago

Brought to you bytines The smart, secure workflow builder Show notes Risky Bulletin: Russia to designate ERPs as "critical information infrastructure"

Score
81
Read more
5

SonicWall Probes Potential Zero-Day After Ransomware Hits

Data Breach Today UK • 11 hours ago

Akira Ransomware Exploited MFA-Protected SonicWall SSL VPNs, Say Researchers SonicWall said it is probing a surge in attacks against its Gen 7 firewalls, running various firmware versions, which have SSL VPN enabled. Researchers said attackers may have been exploiting a zero-day vulnerability and that multiple victims have been infected with Akira ransomware.

Score
78
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

ATTACK TYPES
Data Leakage
Firmware Exploitation
Physical Access Attack
VULNERABILITIES
Arbitrary Code Execution
Data Exposure
Firmware Vulnerabilities
Firmware Vulnerability
Out-of-Bounds Access
CVES
CVE-2025-24311
CVE-2025-24919
CVE-2025-24922
CVE-2025-25050
CVE-2025-25215
COMPANIES
Cisco
Dell
PLATFORMS
Windows
INDUSTRIES
Cybersecurity
Government
ARTICLE INFORMATION
Article #8871
Published 14 hours ago
Therecord

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration