3 different VMware zero days, under active exploitation by ransomware groups
CVE-2025-22224, CVE-2025-22225, CVE-2025-22226
VMware ESXi
VMware Workstation Pro / Player (Workstation)
VMware Fusion
VMware Cloud Foundation
VMware Telco Cloud Platform
(Exploitation actually ESXi)
I need to do a blog post on this, but it seems like a lot of old tricks have been lost over the years. One thing I was thinking about is all the ways to obscure an executable name in command prompts. For example, and I'm not sure how many of them are documented, but all of these work:
BlackHoodie will be back at @_ringzer0 Bootcamp on March 21st with a training about Compiler Internals for Security Engineers, brought to you by.. me ๐ Registration is open, please tell your friends and hacker family, alternatively Shares appreciated ๐ https://blackhoodie.re/Ringzer0_Bootstrap_2025/
My team designed and is maintaining Enclaves. Good article here :-)
Two seemingly blockbuster stories published on Friday that reported that the Trump admin had ordered US Cyber Command and CISA to "stand down" on their work to detect and counter Russian cyber threats. But new info has come out to contradict the stories or qualify them. I dug into what we know and don't know. As always, if anyone has any additional information related to these stories, please contact me on Signal at KimZ.42.
New blog post: Electronic signing in Collabora Online https://vmiklos.hu/blog/cool-esign.html
CP/M Users: Looking for a copy of Avocet XASM85 for a resurrection project. #retrocomputing
๐ KeePassXC 2.7.10 is out! ๐ฅณ
The most prominent changes in this release are the addition of a Proton Pass importer and (due to popular request) a new setting for changing the application font size. You can find the full list of changes on our website:
https://keepassxc.org/blog/2025-03-04-2.7.10-released/
๐๐ผ๐ถ๐ป ๐ผ๐๐ฟ ๐น๐ถ๐๐ฒ ๐๐ฒ๐ฏ๐ถ๐ป๐ฎ๐ฟ ๐ผ๐ป ๐ ๐ฎ๐ฟ๐ฐ๐ต ๐ฒ๐๐ต!
Discover how to eliminate debugging inefficiencies and accelerate vulnerability research with time travel analysis.
Register now ๐
https://www.linkedin.com/events/exploitingaroutervulnerabilityw7299810055170805761/
#cybersecurity #webinar #vulnerability #malware #reverseengineering