Sys-Admin InfoSec
12.6K subscribers
236 photos
2 videos
103 files
4.56K links
News of cybersecurity / information security, information technology, data leaks / breaches, cve, hacks, tools, trainings
* Multilingual (En, Ru).
* Forum - forum.sys-adm.in
* Chat - @sysadm_in
* Job - @sysadm_in_job
* ? - @sysadminkz
Download Telegram
December 2025 Security Updates

This release consists of the following 57 Microsoft CVEs:

https://msrc.microsoft.com/update-guide/releaseNote/2025-Dec
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Time Nist Gov Incorrect Time

The affected servers are:
time-a-b.nist.gov
time-b-b.nist.gov
time-c-b.nist.gov
time-d-b.nist.gov
time-e-b.nist.gov
ntp-b.nist.gov (authenticated NTP)

https://groups.google.com/a/list.nist.gov/g/internet-time-service/c/o0dDDcr1a8I
Bluetooth Headphone Jacking: Full Disclosure of Airoha RACE Vulnerabilities

https://insinuator.net/2025/12/bluetooth-headphone-jacking-full-disclosure-of-airoha-race-vulnerabilities/
StackWarp is a security vulnerability that exploits a synchronization bug present in all AMD Zen 1–5 processors. In the context of SEV-SNP, this flaw allows malicious VM hosts to manipulate the guest VM’s stack pointer

https://stackwarpattack.com/
Malware Peddlers Are Now Hijacking Snap Publisher Domains

There’s a relentless campaign by scammers to publish malware in the Canonical Snap Store. Some gets caught by automated filters, but plenty slips through. Recently, these miscreants have changed tactics - they’re now registering expired domains belonging to legitimate snap publishers, taking over their accounts, and pushing malicious updates to previously trustworthy applications..:

https://blog.popey.com/2026/01/malware-purveyors-taking-over-published-snap-email-domains/
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
7 ваучеров на 100% скидку The Linux Foundation

+ 7 доступов к видеокурсу Kubernetes База

Ваучеры применимы к любому:

— онлайн-курсу
— сертификационному экзамену (CKA, CKS, CKAD и не только)
— или пакету (курс + сертификация)

29 января подведем итоги и выберем 7 победителей. Каждый победитель получит ваучер + доступ к курсу от Slurm.

Актививация активна до 07.01.2027, после будет 1 год и 2 попытки, чтобы завершить обучение и сдать экзамен.

Детали здесь - https://core247.kz/cncf
Threat Actors Expand Abuse of Microsoft Visual Studio Code

This activity involved the deployment of a backdoor implant that provides remote code execution capabilities on the victim system:

https://www.jamf.com/blog/threat-actors-expand-abuse-of-visual-studio-code/
Open-Source Python Script Drives Social Media Phishing Campaign

..In this particular campaign, attackers abused LinkedIn’s professional context to establish trust and familiarity, increasing their chances of success by targeting high-value individuals in corporate environments. This tactic, however, could be applied to any social media platform commonly accessed on business devices..:

https://reliaquest.com/blog/threat-spotlight-open-source-python-script-drives-social-media-phishing-campaign
Microsoft mishandling example.com

Microsoft's Autodiscover service has incorrectly routed the IANA-reserved example.com to Sumitomo Electric Industries' mail servers at sei.co.jp, potentially sending test credentials there.

https://tinyapps.org/blog/microsoft-mishandling-example-com.html