Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for ParrotOS 7 Released  ...

 Firewall Daily

The Parrot Security Team officially released ParrotOS 7, describing it as one of the most significant updates in the project’s history. The new version represents a complete rewrite of the operating system, introducing architectural changes that affect nearly every layer of the distribution. According to the   show more ...

developers, the release was shaped heavily by community involvement, with contributors participating not only in beta testing but also in higher-level planning and decision-making.  ParrotOS 7 is codenamed Echo, inspired by the Echo Parakeet, also known as the Mauritius Parakeet. The codename is reflected in a redesigned visual identity that includes a new default wallpaper, revised icons, and updated color schemes. These changes are delivered through a dedicated package called echo-themes, which is included by default and available through the project’s graphics repository.  Transition to KDE Plasma 6 and Debian 13 Foundation  One of the most impactful changes in ParrotOS 7 is the switch to KDE Plasma 6 as the default desktop environment. The move replaces MATE in new installations and introduces Wayland as the default display protocol. The Parrot team applied custom theming and performance-focused optimizations to keep KDE Plasma 6 lightweight while maintaining consistency with the project’s design goals.  This desktop transition required significant refactoring of system components. The parrot-core package, version 7.0.10, was redesigned to support KDE’s plain-text configuration files, moving away from its earlier dependence on MATE and the dconf database. Additional system packages, including Parrot-Interface 7.0.2, Parrot-Menu 7.0.16, and Parrot-Desktop-KDE 7.0.2, were updated to support the new environment.  ParrotOS 7 is built on Debian 13, inheriting upstream changes while introducing its own build and deployment improvements. ISO images continue to be generated using live-build, while a custom system produces optimized virtual machine images for QEMU, VirtualBox, VMware, and UTM. These images are distributed in formats such as .qcow2, .vmdk, .ova, .vdi, and .utm.  Toolchain Updates and Introduction of AI Categories  Tooling remains a core focus of the ParrotOS operating system. ParrotOS 7 introduces several new security tools, including convoC2, goshs, evil-winrm-py, hexstrike-ai, bpf-linker, pkinit-tools, chisel, autorecon, and trufflehog. Existing tools received updates, such as airgeddon 11.60, Burp Suite 2025.10.5 with added arm64 support, Caido 0.53.1, Jadx 1.4.7, Maltego 4.8.1, and bloodhound.py 1.8.0.  Core language and system components were also refreshed. ParrotOS 7 ships with Python 3.13.5, Go 1.24.4, OpenJDK 25.0.1, glibc 2.41, and AppArmor 4.1.0. The parrot-tools metapackage was expanded to pre-install more utilities, reorganizing tools across development, information-gathering, reversing, cloud, and cryptography categories.  A notable structural change in ParrotOS 7 is the addition of a dedicated AI tools category. The developers stated, “You asked, we delivered,” while clarifying that their goal is to support tools designed to test and secure large language models rather than promote unchecked automation. The first AI-focused tool included is Hexstrike AI, with plans to integrate additional MCP-powered utilities focused on prompt security and LLM assessment.  Platform Expansion, Updates, and Upgrade Guidance  ParrotOS 7 is the first penetration testing distribution to officially support RISC-V, providing a pre-assembled root filesystem tarball and repository-level support for Debian packages and Parrot tools compiled for the architecture. Docker images and Windows Subsystem for Linux (WSL) builds have also been updated to Echo, with automated CI/CD pipelines ensuring consistent builds and rapid updates.  System maintenance tools were revised as well. The parrot-updater utility was completely rewritten in Rust, with a new GTK4-based graphical interface. The tool now performs weekly update checks and displays notifications when updates are available. The Rocket application reached version 1.3.0, bringing performance improvements.  The transition to KDE Plasma 6 also affects Raspberry Pi editions. While support continues, the Parrot team recommends using the Core Edition on Raspberry Pi 3B systems and limiting full editions to devices with at least 2 GB of RAM. Alternative desktop environments such as MATE or XFCE may be reconsidered in future releases.  Due to the scope of changes in ParrotOS 7, the developers recommend a clean installation rather than upgrading from Parrot 6 Lorykeet. The 6.x branch will continue receiving security updates, and an automated migration path is planned once the transition is considered stable. Users upgrading older systems should note that adopting KDE Plasma 6 may require manual migration of configuration files from /etc/skel to user home directories. 

image for Critical Net-SNMP Fl ...

 Firewall Daily

A newly disclosed security issue in the Net-SNMP software suite has raised serious concerns for organizations that rely on the protocol to monitor and manage network infrastructure. The vulnerability, identified as CVE-2025-68615, affects a core component of Net-SNMP and could allow remote attackers to crash   show more ...

critical services or potentially gain deeper control over affected systems.  Net-SNMP is a widely used implementation of the Simple Network Management Protocol (SNMP), commonly deployed across enterprise and service provider environments. It is used to monitor and manage routers, switches, servers, and other network-connected devices. Because of its widespread adoption, vulnerabilities within Net-SNMP often have broad implications, and CVE-2025-68615 is no exception.  According to advisories published on GitHub, the flaw exists in the snmptrapd daemon, a background service responsible for receiving and processing SNMP trap messages. Trap messages are unsolicited alerts sent by devices to notify administrators of specific events. In the case of CVE-2025-68615, the daemon improperly handles incoming packets, creating an opportunity for exploitation.  Buffer Overflow in snmptrapd Enables Denial of Service (CVE-2025-68615)  The GitHub advisory explains that a threat actor can exploit this issue by sending a “specially crafted packet” to a vulnerable snmptrapd instance. When the daemon attempts to process the malformed data, a buffer overflow occurs. As described in the advisory, this condition causes the daemon to crash, resulting in a denial-of-service scenario.  The official description states: “A specially crafted packet to a net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to crash.” While a service crash is the most immediate effect, the underlying vulnerability presents a broader security risk.  CVE-2025-68615 has been assigned a Common Vulnerability Scoring System (CVSS) score of 9.8, classifying it as Critical. The CVSS metrics indicate a “High” impact on confidentiality, integrity, and availability. In security assessments, a buffer overflow with these ratings often implies that exploitation could extend beyond service disruption.  Experts caution that vulnerabilities like CVE-2025-68615 may allow attackers to execute arbitrary code remotely, potentially enabling full system compromise without authentication or user interaction. This risk is heightened by the fact that the snmptrapd daemon often runs with elevated privileges and is designed to accept network traffic.  Patch Availability and Recommended Mitigations  The vulnerability was discovered by buddurid, working in collaboration with the Trend Micro Zero Day Initiative. Following responsible disclosure, the Net-SNMP maintainers issued fixes and published details through a GitHub Security Advisory tracked as GHSA-4389-rwqf-q9gq. According to the advisory, all versions of Net-SNMP are affected. The issue has been resolved in Net SNMP versions 5.9.5 and 5.10.pre2, and administrators running the snmptrapd daemon are urged to upgrade immediately. The advisory notes: “Users of Net-SNMP's snmptrapd should upgrade immediately to Net-SNMP 5.9.5 or 5.10.pre2.”  For organizations unable to deploy patches immediately, the advisory outlines limited workaround options. Network segmentation remains the primary defense. SNMP ports should never be exposed to the public internet, and firewall rules should block external access to the snmptrapd port. The advisory emphasizes that there is no mitigation other than upgrading or ensuring the service is properly firewalled.  As details continue to circulate on GitHub and through security channels, organizations using Net-SNMP are encouraged to review their deployments, confirm firewall configurations, and prioritize updates. Given the critical severity of CVE-2025-68615 and the essential role Net-SNMP plays in network monitoring, timely remediation is necessary to reduce the risk of service disruption or system compromise. 

 Feed

A critical security flaw has been disclosed in LangChain Core that could be exploited by an attacker to steal sensitive secrets and even influence large language model (LLM) responses through prompt injection. LangChain Core (i.e., langchain-core) is a core Python package that's part of the LangChain ecosystem, providing the core interfaces and model-agnostic abstractions for building

 Feed

Trust Wallet is urging users to update its Google Chrome extension to the latest version following what it described as a "security incident" that led to the loss of approximately $7 million. The issue, the multi‑chain, non‑custodial cryptocurrency wallet service said, impacts version 2.68. The extension has about one million users, according to the Chrome Web Store listing. Users are advised to

 Feed

A China-linked advanced persistent threat (APT) group has been attributed to a highly-targeted cyber espionage campaign in which the adversary poisoned Domain Name System (DNS) requests to deliver its signature MgBot backdoor in attacks targeting victims in Türkiye, China, and India. The activity, Kaspersky said, was observed between November 2022 and November 2024. It has been linked to a

2025-12
Aggregator history
Friday, December 26
MON
TUE
WED
THU
FRI
SAT
SUN
DecemberJanuaryFebruary