Exploited Vulnerability Exposes Over 400 SAP NetWeaver Servers to Attacks

More than 400 SAP NetWeaver servers are impacted by CVE-2025-31324, an exploited remote code execution vulnerability.

The post Exploited Vulnerability Exposes Over 400 SAP NetWeaver Servers to Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More

RSA Conference 2025 Announcements Summary (Day 1) 

Hundreds of companies are showcasing their products and services this week at the 2025 edition of the RSA Conference in San Francisco.

The post RSA Conference 2025 Announcements Summary (Day 1)  appeared first on SecurityWeek.

SecurityWeek – ​Read More

Vulnerability Exploitation Is Shifting in 2024-25

The number of vulnerabilities exploited by attacks may not be growing these days, but they are increasingly affecting enterprise technologies.

darkreading – ​Read More

Government hackers are leading the use of attributed zero-days, Google says

Governments like China and North Korea, along with spyware makers, used the most recorded zero-days in 2024.

Security News | TechCrunch – ​Read More

CISA Warns of Exploited Broadcom, Commvault Vulnerabilities

CISA urges immediate patching for recently disclosed Broadcom, Commvault, and Qualitia vulnerabilities exploited in the wild.

The post CISA Warns of Exploited Broadcom, Commvault Vulnerabilities appeared first on SecurityWeek.

SecurityWeek – ​Read More

Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool

In a new campaign detected in March 2025, senior members of the World Uyghur Congress (WUC) living in exile have been targeted by a Windows-based malware that’s capable of conducting surveillance.
The spear-phishing campaign involved the use of a trojanized version of a legitimate open-source word processing and spell check tool called UyghurEdit++ developed to support the use of the Uyghur

The Hacker News – ​Read More

Introducing EntraFalcon – A Tool to Enumerate Entra ID Objects and Assignments

TL;DR: PowerShell tool to enumerate Entra ID objects, assignments and identify highly privileged objects or risky configurations.

https://github.com/CompassSecurity/EntraFalcon

Entra ID environments can contain thousands of objects – users, groups, service principals, and more – each with unique properties and complex relationships. While manual reviews through the Entra portal might be feasible in smaller environments, they become a tedious task in larger, complex environments.

There are already several free tools available for enumerating Entra ID data. However, some of them typically focus only on dumping data, without offering much support for identifying highly privileged objects or potentially risky object configurations. Other tools do not enumerate certain objects, properties or assignments like Administrative Units, Application app lock configurations, M365 groups or Privileged Identity Management (PIM) eligible assignments.

This is why we built EntraFalcon, a PowerShell tool designed to help security analysts, penetration testers, and sysadmins review Entra ID environments. It highlights potentially risky object configurations and privileged assignments that are often overlooked.

Key Features

  • Enumerates Entra ID objects, including:
    • Users, Groups (incl. PIM-eligible assignments), App Registrations, Enterprise Apps, Managed Identities, Administrative Units
    • Role assignments: Entra roles, Azure roles (active and PIM-eligible)
    • Conditional Access Policies
  • Applies a simple scoring model to each object, assigning impact, likelihood, and risk scores to help prioritize findings. Interesting configurations or highly elevated privileges are highlighted with warnings
  • Generates interactive HTML reports that are sortable, filterable and exportable
  • Simple and flexible to use:
    • No dependencies: pure PowerShell compatible with both PowerShell 5.1 and 7 (Windows and Linux)
    • Built-in authentication supporting different authentication flows
    • Bypasses Microsoft Graph API consent – using Microsoft first-party apps with pre-consented API permissions for authentication

Example Findings

Some examples EntraFalcon helps to identify:

  • Users with control over highly privileged groups or applications
  • Foreign or internal enterprise applications with excessive permissions (e.g., Microsoft Graph API, Entra/Azure role assignments)
  • Users assigned Azure IAM roles directly on resources
  • Highly privileged accounts that are synchronized from on-premises directories
  • Inactive accounts or users without MFA capability
  • Unprotected groups used in sensitive assignments (e.g., Conditional Access exclusions, subscription ownership, or eligible member of a privileged group)
  • Missing or misconfigured Conditional Access Policies – such as combining user risk and sign-in risk in a single policy.

Report Samples

Main overview with sortable, filterable, and customizable columns.
Reports include preset filters and column layouts to find interesting objects.
Display detailed information for each object, e.g., for Enterprise Applications.
Conditional Access report highlighting potential misconfigurations and missing policies.
Detailed view of Conditional Access policies with links to referenced objects.
Summary of discovered objects and role assignments.

Required Permissions

To collect data from Entra ID, the user executing the tool requires at least Global Reader permissions.

To include Azure IAM data (optional but recommended), the Reader role is needed for each relevant Management Group or Subscription.

Limitations

While EntraFalcon helps surface potential issues, manual analysis is still essential to fully understand the impact of each finding. Furthermore, the risk scores provided are intended as indicators, not definitive assessments – they should be reviewed in context as part of a broader investigation.

Get Started

To get started with EntraFalcon, visit our GitHub repository for usage instructions, examples, and additional details.

Compass Security Blog – ​Read More

CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two high-severity security flaws impacting Broadcom Brocade Fabric OS and Commvault Web Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.
The vulnerabilities in question are listed below –

CVE-2025-1976 (CVSS score: 8.6) – A code injection flaw

The Hacker News – ​Read More

IBM’s $150 Billion US Investment to Boost Quantum Innovation and National Security

IBM will invest more than $30 billion in research and development to advance and continue its American manufacturing of mainframe and quantum computers.

The post IBM’s $150 Billion US Investment to Boost Quantum Innovation and National Security appeared first on SecurityWeek.

SecurityWeek – ​Read More

How Postal Code Data Impacts Cybersecurity, Privacy and Fraud Prevention

Postal codes now play a key role in cybersecurity, fraud prevention, and digital identity verification, raising new concerns…

Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – ​Read More