<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Zero Day Attack &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/zero-day-attack/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Tue, 14 Apr 2026 10:52:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Zero Day Attack &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Adobe Reader Zero-Day Targets Users</title>
		<link>https://firsthackersnews.com/adobe-reader-zero-day/</link>
					<comments>https://firsthackersnews.com/adobe-reader-zero-day/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 03:24:25 +0000</pubDate>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[#AdobeReader]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#Exploit]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#PDFSecurity]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[#ZeroDayExploit]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11578</guid>

					<description><![CDATA[<p>Security researchers from EXPMON have uncovered a critical zero-day vulnerability in Adobe Reader that is actively being exploited</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/adobe-reader-zero-day/">Adobe Reader Zero-Day Targets Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers from EXPMON have uncovered a critical zero-day vulnerability in Adobe Reader that is actively being exploited in targeted attacks. The flaw enables attackers to steal sensitive data and potentially execute malicious code, all triggered when a victim simply opens a crafted PDF file.</p>



<h3 class="wp-block-heading">Attack Execution and Evasion Techniques</h3>



<p>The malicious PDF is designed to evade traditional detection mechanisms. Initial samples showed extremely low detection rates, indicating that the payload is carefully crafted to bypass antivirus engines.</p>



<p>Once opened, the document executes obfuscated JavaScript hidden within its structure. This script leverages legitimate application functions to interact with the system and external servers, making the activity appear less suspicious.</p>



<p>Key attack characteristics:</p>



<ul class="wp-block-list">
<li>Uses heavily obfuscated JavaScript to avoid detection</li>



<li>Leverages trusted application APIs for malicious actions</li>



<li>Collects system-level data to profile the victim environment</li>



<li>Communicates with external infrastructure to exfiltrate data</li>



<li>Maintains in-memory execution to reduce forensic traces</li>
</ul>



<p>The attack chain is adaptive. Based on the victim’s system profile, the attacker may choose to deliver additional payloads, increasing the likelihood of a successful compromise.</p>



<h3 class="wp-block-heading">Impact and Exploitation Capabilities</h3>



<p>This vulnerability presents a high-risk scenario due to its stealth and ease of exploitation. No advanced interaction is required, making it highly effective in phishing campaigns or targeted attacks.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>Potential impact includes:</p>



<ul class="wp-block-list">
<li>Unauthorized access to sensitive local files</li>



<li>Exposure of system and environment information</li>



<li>Remote code execution leading to full system compromise</li>



<li>Possible sandbox escape, bypassing built-in protections</li>
</ul>



<p>In controlled testing, researchers confirmed that the communication channel used by the malware can support delivery of further payloads, enabling deeper system control.</p>



<h3 class="wp-block-heading">Defensive Measures and Monitoring</h3>



<p>With no official patch currently available, proactive defense becomes critical. Organizations must rely on layered security controls and behavioral monitoring to detect and mitigate threats.</p>



<p>Recommended defensive strategies:</p>



<ul class="wp-block-list">
<li>Block known malicious endpoints and monitor for new suspicious connections</li>



<li>Inspect outbound traffic for unusual patterns linked to PDF processes</li>



<li>Detect anomalies in application behavior, especially unexpected file access</li>



<li>Monitor for suspicious User-Agent strings such as “Adobe Synchronizer”</li>



<li>Restrict execution of active content within PDF files where possible</li>
</ul>



<h3 class="wp-block-heading">Operational Security Considerations</h3>



<p>This incident highlights a broader trend of attackers weaponizing trusted file formats like PDFs to deliver advanced exploits. Since these files are widely used in business environments, they present an effective entry point.</p>



<p>Security teams should strengthen awareness around file-based threats and ensure that users are trained to handle unsolicited documents with caution. Developers and defenders alike must also stay updated with threat intelligence to quickly adapt to evolving attack techniques.</p>



<p>Until an official patch is released, maintaining strict control over document handling and network activity is essential to minimizing risk.<audio autoplay=""></audio></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/adobe-reader-zero-day/">Adobe Reader Zero-Day Targets Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/adobe-reader-zero-day/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco Unified Communications Zero-Day RCE Enables Root Access</title>
		<link>https://firsthackersnews.com/cisco-3/</link>
					<comments>https://firsthackersnews.com/cisco-3/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 22 Jan 2026 07:29:16 +0000</pubDate>
				<category><![CDATA[cisco]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[Zero0day]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11027</guid>

					<description><![CDATA[<p>Cisco has issued an urgent security alert after identifying a previously unknown remote code execution flaw being exploited</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisco-3/">Cisco Unified Communications Zero-Day RCE Enables Root Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cisco has issued an urgent security alert after identifying a <strong>previously unknown remote code execution flaw</strong> being exploited against its Unified Communications platforms. The vulnerability, tracked as <strong>CVE-2026-20045</strong>, enables attackers to compromise systems <strong>without authentication</strong> and ultimately obtain <strong>root-level control</strong>.</p>



<p>Cisco’s security response team has confirmed real-world attacks and advises customers to take immediate action.</p>



<h2 class="wp-block-heading"><strong>How the Attack Works</strong></h2>



<p>The issue originates in the web-based management interface, where <strong>HTTP request input is not properly validated</strong>.</p>



<p>Attackers can exploit this weakness by:</p>



<ul class="wp-block-list">
<li>Sending crafted HTTP requests to the management endpoint</li>



<li>Bypassing authentication controls</li>



<li>Executing commands on the operating system</li>



<li>Escalating privileges to full root access</li>
</ul>



<p>Because the flaw allows complete system takeover, Cisco classified it as <strong>Critical</strong>, prioritizing impact over traditional scoring metrics.</p>



<h2 class="wp-block-heading"><strong>Impacted Cisco Products</strong></h2>



<p>Cisco confirmed the following products are affected, independent of configuration:</p>



<figure class="wp-block-table"><table><thead><tr><th>Product</th><th>Tracking ID</th></tr></thead><tbody><tr><td>Unified Communications Manager</td><td>CSCwr21851</td></tr><tr><td>Unified CM SME</td><td>CSCwr21851</td></tr><tr><td>Unified CM IM &amp; Presence</td><td>CSCwr29216</td></tr><tr><td>Unity Connection</td><td>CSCwr29208</td></tr><tr><td>Webex Calling (Dedicated Instance)</td><td>CSCwr21851</td></tr></tbody></table></figure>



<p>Other Cisco UC components, including Contact Center-related platforms, are confirmed <strong>not vulnerable</strong>.</p>



<h2 class="wp-block-heading"><strong>Software Updates and Fix Availability</strong></h2>



<p>Cisco has released fixes for supported versions. Only the releases listed below are validated by Cisco PSIRT.</p>



<h3 class="wp-block-heading">Unified CM, IM&amp;P, SME, Webex Calling</h3>



<figure class="wp-block-table"><table><thead><tr><th>Version Stream</th><th>Fixed Release</th></tr></thead><tbody><tr><td>12.5</td><td>Upgrade required</td></tr><tr><td>14</td><td>14SU5 or patched 14SU4</td></tr><tr><td>15</td><td>15SU4 (March 2026) or interim patches</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Unity Connection</h3>



<figure class="wp-block-table"><table><thead><tr><th>Version Stream</th><th>Fixed Release</th></tr></thead><tbody><tr><td>12.5</td><td>Upgrade required</td></tr><tr><td>14</td><td>14SU5 or patched 14SU4</td></tr><tr><td>15</td><td>15SU4 (March 2026) or 15SU3</td></tr></tbody></table></figure>



<p>Cisco has observed attackers targeting unpatched deployments, likely using automated discovery techniques to locate exposed management interfaces. Environments supporting enterprise voice and collaboration services are particularly attractive targets.</p>



<p>The vulnerability has also been added to <strong>CISA’s Known Exploited Vulnerabilities catalog</strong>, increasing compliance pressure for affected organizations.</p>



<h2 class="wp-block-heading"><strong>What Cisco Recommends</strong></h2>



<p>Organizations should take the following steps immediately:</p>



<ul class="wp-block-list">
<li>Apply Cisco security updates or upgrade to fixed releases</li>



<li>Restrict access to management interfaces using network controls</li>



<li>Monitor HTTP activity for abnormal request patterns</li>



<li>Investigate systems for indicators of compromise</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisco-3/">Cisco Unified Communications Zero-Day RCE Enables Root Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cisco-3/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Threat Actors List iOS 26 Full-Chain 0-Day on Dark Web</title>
		<link>https://firsthackersnews.com/ios-26/</link>
					<comments>https://firsthackersnews.com/ios-26/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 27 Nov 2025 10:07:36 +0000</pubDate>
				<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[flaw]]></category>
		<category><![CDATA[Full-Chain 0-Day]]></category>
		<category><![CDATA[iOS 26]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[threat actors]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10710</guid>

					<description><![CDATA[<p>A threat actor calling themselves ResearcherX has claimed to sell a full-chain zero-day exploit for Apple’s new iOS</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ios-26/">Threat Actors List iOS 26 Full-Chain 0-Day on Dark Web</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A threat actor calling themselves ResearcherX has claimed to sell a full-chain zero-day exploit for Apple’s new iOS 26. The listing, posted on a major dark web marketplace, says the exploit abuses a serious memory-corruption flaw in the iOS Message Parser.</p>



<p>If real, this bug could break Apple’s latest security protections and allow attackers to gain root access on modern iPhones and iPads without any user action. The seller describes it as a full-chain exploit, meaning it can move from initial entry to complete device takeover.</p>



<p>They also claim the attack works through malformed messages, making it a zero-click exploit that triggers as soon as the victim receives the data. The issue is described as a memory-corruption bug, a recurring weakness in complex parsing systems despite recent security improvements.</p>



<p>The listing claims the exploit can bypass iOS 26’s new multi-layer protections and gain full root access, exposing sensitive data like messages, photos, location, and keychain items. The seller also says it runs with high stealth and causes no crashes or alerts, making it difficult to detect.</p>



<h2 class="wp-block-heading"><strong>New iOS 26 Flaw Raises Questions</strong></h2>



<p>iOS 26 was released in September 2025 and was promoted as a major security upgrade. Apple added new protections to strengthen the kernel and reduce memory-related vulnerabilities — the same type of flaw ResearcherX claims to have exploited.</p>



<p>If the listing is real, it suggests attackers may have already found ways around these new defenses. Working iOS zero-day chains on the dark web often sell for millions, usually between $2 million and $5 million. ResearcherX labeled this one as an “Exclusive Sale,” meaning it would be sold to only one buyer, likely a nation-state or private intelligence group.</p>



<p>Experts warn that many dark web listings are fake, even from “verified” sellers. Still, the mention of the iOS Message Parser fits with past iOS attack methods, where components like iMessage have been common targets.</p>



<p>Security researchers advise organizations and high-risk users to watch for quick patch releases, such as iOS 26.0.2, which may fix issues related to message-parsing vulnerabilities.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ios-26/">Threat Actors List iOS 26 Full-Chain 0-Day on Dark Web</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/ios-26/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Expose 34 Zero-Day Flaws at Pwn2Own Ireland 2025 — Over $522,000 Awarded on Day One</title>
		<link>https://firsthackersnews.com/pwn2own-ireland-2025-zero-day-vulnerabilities/</link>
					<comments>https://firsthackersnews.com/pwn2own-ireland-2025-zero-day-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 22 Oct 2025 08:37:30 +0000</pubDate>
				<category><![CDATA[hackers]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#Hackers]]></category>
		<category><![CDATA[#Pwn2Own]]></category>
		<category><![CDATA[#Pwn2Own2025]]></category>
		<category><![CDATA[#SmartHomeSecurity]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10539</guid>

					<description><![CDATA[<p>Record-Breaking Day for Security Researchers Day One of Pwn2Own Ireland 2025 concluded with an extraordinary showcase of cybersecurity</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/pwn2own-ireland-2025-zero-day-vulnerabilities/">Hackers Expose 34 Zero-Day Flaws at Pwn2Own Ireland 2025 — Over $522,000 Awarded on Day One</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading"><strong>Record-Breaking Day for Security Researchers</strong></h2>



<p>Day One of Pwn2Own Ireland 2025 concluded with an extraordinary showcase of cybersecurity talent, as researchers demonstrated 34 unique zero-day vulnerabilities across a wide range of consumer devices.<br>The exploits earned participants a combined payout of $522,500, marking one of the most successful opening days in the competition’s history.</p>



<p>Hosted by Trend Micro’s <strong>Zero Day Initiative (ZDI)</strong>, Pwn2Own is renowned for uncovering security flaws in real-world products. This year’s event stood out for its <strong>100% success rate</strong>, with every single exploit attempt succeeding on the first day — a rare achievement in competitive hacking.</p>



<h2 class="wp-block-heading"><strong>Teams Dominate Smart Home and NAS Devices</strong></h2>



<p>The first day featured 17 exploitation attempts targeting various connected devices including printers, routers, smart home systems, and NAS (Network-Attached Storage) units from major global manufacturers.</p>



<p>Team DDOS, made up of Bongeun Koo and Evangelos Daravigkas, took an early lead by chaining together eight vulnerabilities to compromise both a QNAP Qhora-322 router and a QNAP TS-453E NAS device.<br>Their impressive “SOHO Smashup” demonstration earned them $100,000 in prize money and 10 Master of Pwn points, placing them among the top contenders early in the event.</p>



<h2 class="wp-block-heading"><strong>Smart Home Devices Fall to Expert Exploits</strong></h2>



<p>Several popular smart home products were also successfully compromised, including the Philips Hue Bridge, Synology ActiveProtect DP320, and Home Assistant Green.</p>



<p>Sina Kheirkhah from the Summoning Team stood out for participating in multiple successful exploits, including a powerful attack against the Synology ActiveProtect Appliance DP320 that earned an additional $50,000 in rewards.</p>



<p>In one of the most notable demonstrations, researcher DMDung of STAR Labs exploited a single out-of-bounds access vulnerability to take control of the Sonos Era 300 smart speaker — achieving the highest single-device payout of $50,000 and securing five Master of Pwn points.</p>



<p>Consumer printers were not spared from the day’s onslaught of exploits. Both Canon and HP devices were successfully hacked, highlighting ongoing concerns about the security of office and home printers.</p>



<p>The Canon imageCLASS MF654Cdw was a particularly popular target, with four different teams exploiting it using combinations of heap-based and stack-based buffer overflow vulnerabilities.<br>Meanwhile, Team Neodyme executed a stack-based buffer overflow on the HP DeskJet 2855e, earning $20,000 for their exploit.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/pwn2own-ireland-2025-zero-day-vulnerabilities/">Hackers Expose 34 Zero-Day Flaws at Pwn2Own Ireland 2025 — Over $522,000 Awarded on Day One</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/pwn2own-ireland-2025-zero-day-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical Oracle EBS Vulnerability CVE-2025-61882 Actively Exploited by Cl0p Ransomware Group</title>
		<link>https://firsthackersnews.com/clop-exploits-oracle-ebs-cve-2025-61882-remote-code-execution/</link>
					<comments>https://firsthackersnews.com/clop-exploits-oracle-ebs-cve-2025-61882-remote-code-execution/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 07 Oct 2025 09:33:42 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10523</guid>

					<description><![CDATA[<p>A critical security flaw in Oracle E-Business Suite (EBS) is being actively exploited by the Cl0p ransomware group,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clop-exploits-oracle-ebs-cve-2025-61882-remote-code-execution/">Critical Oracle EBS Vulnerability CVE-2025-61882 Actively Exploited by Cl0p Ransomware Group</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical security flaw in <strong>Oracle E-Business Suite (EBS)</strong> is being actively exploited by the <strong>Cl0p ransomware group</strong>, also known as <strong>Graceful Spider</strong>, according to a new advisory from <strong>CrowdStrike</strong>. The first known exploitation was detected on <strong>August 9, 2025</strong>.</p>



<ul class="wp-block-list">
<li><strong>SSRF</strong> (Server-Side Request Forgery) to coerce backend servers into making arbitrary requests.</li>



<li><strong>CRLF injection</strong> to insert custom headers into requests.</li>



<li><strong>Request smuggling</strong> to access internal endpoints and upload malicious templates.</li>
</ul>



<p>This attack abuses the ability of JSP files to load untrusted stylesheets, allowing arbitrary code execution. Persistent HTTP connections are used to chain multiple requests, increasing reliability and reducing detection.</p>



<p>The <strong>Cybersecurity and Infrastructure Security Agency (CISA)</strong> has added CVE-2025-61882 to its <strong>Known Exploited Vulnerabilities (KEV)</strong> catalog. The agency has warned that the vulnerability has already been used in <strong>ransomware campaigns</strong>. All federal agencies have been ordered to apply security patches by <strong>October 27, 2025</strong>.</p>



<p>Security experts have raised alarms that <strong>mass exploitation</strong> is expected within days. Cl0p has already targeted multiple organizations since August, stealing sensitive data and issuing <strong>extortion emails</strong>.</p>



<p>Organizations using Oracle EBS are being strongly advised to <strong>patch immediately</strong>, <strong>conduct threat hunts</strong>, and <strong>strengthen access controls</strong>. Delays in remediation could lead to significant <strong>data breaches</strong>, <strong>financial loss</strong>, and <strong>operational disruption</strong>.</p>



<p><strong>SEO Keywords included</strong>: Oracle E-Business Suite, CVE-2025-61882, Cl0p ransomware, remote code execution, SSRF, CRLF injection, WatchTowr Labs, CrowdStrike, CISA KEV, cybersecurity vulnerability, patch advisory.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clop-exploits-oracle-ebs-cve-2025-61882-remote-code-execution/">Critical Oracle EBS Vulnerability CVE-2025-61882 Actively Exploited by Cl0p Ransomware Group</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/clop-exploits-oracle-ebs-cve-2025-61882-remote-code-execution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical Cisco ASA and FTD Zero-Day  Vulnerabilities Under Active Attack</title>
		<link>https://firsthackersnews.com/cisco-asa-zero-day-vulnerabilities-2025/</link>
					<comments>https://firsthackersnews.com/cisco-asa-zero-day-vulnerabilities-2025/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 26 Sep 2025 05:30:26 +0000</pubDate>
				<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[#CiscoSecurity]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#Firewalls]]></category>
		<category><![CDATA[#IncidentResponse]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#SIEM]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10515</guid>

					<description><![CDATA[<p>Attackers Exploiting VPN and Web Services to Gain Root Access — CISA Issues Emergency Directive Two critical zero-day</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisco-asa-zero-day-vulnerabilities-2025/">Critical Cisco ASA and FTD Zero-Day  Vulnerabilities Under Active Attack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading"><strong>Attackers Exploiting VPN and Web Services to Gain Root Access — CISA Issues Emergency Directive</strong></h2>



<p>Two critical zero-day vulnerabilities in Cisco’s firewall technologies—ASA (Adaptive Security Appliance) and FTD (Firepower Threat Defense)—are currently being actively exploited in the wild, prompting an emergency directive from the U.S. Cybersecurity and Infrastructure Security Agency (CISA). Cisco confirmed the vulnerabilities, tracked as CVE-2025-20333 and CVE-2025-20362, which could allow attackers to bypass authentication, gain root access, and even tamper with device memory.</p>



<p>The most critical of the two flaws, <strong>CVE-2025-20333</strong>, carries a <strong>CVSS score of 9.9</strong> and affects ASA and FTD devices configured with remote access VPNs. An authenticated attacker can exploit this vulnerability by sending a specially crafted HTTPS request, allowing them to execute arbitrary code on the device with root privileges. This level of access could allow complete takeover of the device.</p>



<p>The second flaw, <strong>CVE-2025-20362</strong>, with a <strong>CVSS score of 6.5</strong>, allows an <strong>unauthenticated attacker</strong> to access sensitive, restricted URLs. While not as severe as CVE-2025-20333, it could be used in combination to gain deeper access or escalate privileges.</p>



<p>Cisco warns that these vulnerabilities can be chained together, enabling attackers to bypass authentication protections and gain high-level access to firewall systems. More alarmingly, the attackers are reportedly able to modify the device’s read-only memory (ROM)—a serious red flag for firmware-level persistence. This means that even a device reboot or firmware update may not fully remove the attacker’s presence.</p>



<p>These attacks are not theoretical. Cisco confirms that <strong>real-world exploitation is already underway</strong>, and evidence suggests a <strong>sophisticated, state-sponsored threat actor</strong> may be behind the campaign.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cisco-asa-zero-day-vulnerabilities-2025/">Critical Cisco ASA and FTD Zero-Day  Vulnerabilities Under Active Attack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cisco-asa-zero-day-vulnerabilities-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Google Chrome Zero-Day Vulnerability Exploited in the Wild: Urgent Update Required to Patch CVE-2025-10585</title>
		<link>https://firsthackersnews.com/google-chrome-zero-day-vulnerability-fix-2025/</link>
					<comments>https://firsthackersnews.com/google-chrome-zero-day-vulnerability-fix-2025/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 11:18:19 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[#Browser security]]></category>
		<category><![CDATA[#Chrome security update]]></category>
		<category><![CDATA[#Google Chrome]]></category>
		<category><![CDATA[#V8 JavaScript engine]]></category>
		<category><![CDATA[#Zero-day vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10502</guid>

					<description><![CDATA[<p>Google has issued an emergency security update for its Chrome browser following the discovery of a critical zero-day</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/google-chrome-zero-day-vulnerability-fix-2025/">Google Chrome Zero-Day Vulnerability Exploited in the Wild: Urgent Update Required to Patch CVE-2025-10585</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Google has issued an emergency security update for its Chrome browser following the discovery of a critical zero-day vulnerability actively being exploited by threat actors. On September 16, 2025, Google&#8217;s Threat Analysis Group identified CVE-2025-10585, a type confusion flaw in the V8 JavaScript engine that powers Chrome&#8217;s web rendering capabilities. This vulnerability allows attackers to corrupt memory by misinterpreting data types during JavaScript execution on malicious websites, potentially enabling remote code execution (RCE) on victims&#8217; devices. Such exploits can lead to full system compromise, data theft, or malware installation without user interaction, making it a high-risk threat for everyday web users, enterprises, and organizations relying on Chrome.</p>



<p>The patch was rolled out swiftly on September 17, 2025, via Chrome version 140.0.7339.185 for Linux and 140.0.7339.185/.186 for Windows and macOS. This update not only addresses the zero-day but also fixes three additional high-severity issues: a use-after-free bug in Dawn (CVE-2025-10500), another in WebRTC (CVE-2025-10501), and a heap buffer overflow in ANGLE (CVE-2025-10502). Google has withheld technical details on the exploitation method to limit further attacks, but confirmed real-world abuse. Users are strongly advised to update immediately through Chrome&#8217;s settings menu, as automatic updates may take time. For businesses, enhanced network monitoring and vulnerability scanning are recommended to detect and mitigate potential breaches. This incident underscores the ongoing cat-and-mouse game in cybersecurity, where zero-days like this highlight the importance of timely patching in browser ecosystems</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/google-chrome-zero-day-vulnerability-fix-2025/">Google Chrome Zero-Day Vulnerability Exploited in the Wild: Urgent Update Required to Patch CVE-2025-10585</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/google-chrome-zero-day-vulnerability-fix-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apple Fixes Safari Security Flaw Also Targeted in Recent Chrome Zero-Day Exploit</title>
		<link>https://firsthackersnews.com/apple-security-update-cve-2025-6558/</link>
					<comments>https://firsthackersnews.com/apple-security-update-cve-2025-6558/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 31 Jul 2025 11:25:32 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[#ApplePatch]]></category>
		<category><![CDATA[#AppleSecurity]]></category>
		<category><![CDATA[#CVE2025]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#iOSUpdate]]></category>
		<category><![CDATA[#MacSecurity]]></category>
		<category><![CDATA[#SafariVulnerability]]></category>
		<category><![CDATA[#SecurityUpdate]]></category>
		<category><![CDATA[#WebKitVulnerability]]></category>
		<category><![CDATA[#ZeroDayExploit]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10444</guid>

					<description><![CDATA[<p>On Tuesday, Apple rolled out security updates for its entire software lineup, addressing a vulnerability that Google identified</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apple-security-update-cve-2025-6558/">Apple Fixes Safari Security Flaw Also Targeted in Recent Chrome Zero-Day Exploit</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>On Tuesday, Apple <a href="https://support.apple.com/en-us/100100" target="_blank" rel="noopener"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">rolled out</mark></a> security updates for its entire software lineup, addressing a vulnerability that Google identified as a zero-day exploit in Chrome earlier this month.</p>



<p>The flaw, labeled <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6558" target="_blank" rel="noopener"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">CVE-2025-6558</mark></a> (CVSS score: 8.8), stems from improper validation of untrusted input in the browser&#8217;s ANGLE and GPU components. This could potentially allow a sandbox escape through a specially crafted HTML page.</p>



<p>Although specific details on how the vulnerability has been used in attacks are scarce, Google confirmed that &#8220;an exploit for CVE-2025-6558 exists in the wild.&#8221; The discovery and reporting of this issue are credited to Clément Lecigne and Vlad Stolyarov from Google&#8217;s Threat Analysis Group (TAG).</p>



<p>In its latest updates, Apple also addressed CVE-2025-6558, noting that the vulnerability affects the WebKit engine, which powers Safari.</p>



<p>&#8220;In an advisory, Apple stated that this vulnerability exists in open-source code, with Apple software being one of the affected projects. It could potentially be exploited to cause an unexpected crash in Safari when handling maliciously crafted web content.&#8221;</p>



<p>The issue has been resolved in the following versions:</p>



<p>The vulnerability has been addressed in the following software updates:</p>



<ul class="wp-block-list">
<li><strong>iOS 18.6 and iPadOS 18.6</strong>: For iPhone XS and later, iPad Pro 13-inch, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 7th generation and later, and iPad mini 5th generation and later.</li>



<li><strong>iPadOS 17.7.9</strong>: For iPad Pro 12.9-inch 2nd generation, iPad Pro 10.5-inch, and iPad 6th generation.</li>



<li><strong>macOS Sequoia 15.6</strong>: For Macs running macOS Sequoia.</li>



<li><strong>tvOS 18.6</strong>: For Apple TV HD and Apple TV 4K (all models).</li>



<li><strong>watchOS 11.6</strong>: For Apple Watch Series 6 and later.</li>



<li><strong>visionOS 2.6</strong>: For Apple Vision Pro.</li>
</ul>



<p>Although there is no evidence suggesting that the vulnerability has been exploited to target Apple device users, it&#8217;s always recommended to update to the latest software versions to ensure optimal protection and security.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apple-security-update-cve-2025-6558/">Apple Fixes Safari Security Flaw Also Targeted in Recent Chrome Zero-Day Exploit</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/apple-security-update-cve-2025-6558/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Google’s AI tool Big Sleep has discovered a critical zero-day vulnerability in SQLite and has successfully blocked its active exploitation</title>
		<link>https://firsthackersnews.com/big-sleep-ai-blocks-sqlite-0day-vulnerability/</link>
					<comments>https://firsthackersnews.com/big-sleep-ai-blocks-sqlite-0day-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 17 Jul 2025 04:53:18 +0000</pubDate>
				<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#GoogleSecurity]]></category>
		<category><![CDATA[#SQLiteVulnerability]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<category><![CDATA[#ZeroDayExploit]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10394</guid>

					<description><![CDATA[<p>Google’s cutting-edge AI-driven security tool, Big Sleep, has reached a major milestone by identifying and halting the exploitation</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/big-sleep-ai-blocks-sqlite-0day-vulnerability/">Google’s AI tool Big Sleep has discovered a critical zero-day vulnerability in SQLite and has successfully blocked its active exploitation</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Google’s cutting-edge AI-driven security tool, <strong>Big Sleep</strong>, has reached a major milestone by identifying and halting the exploitation of a critical <strong>SQLite 0-day vulnerability</strong>, making it the first instance where an AI agent has actively neutralized a live cyber threat.</p>



<p>The uncovered flaw, CVE-2025-6965, was previously unknown to the public and exclusively leveraged by threat actors—highlighting the game-changing role of AI in modern cybersecurity defense.</p>



<p><strong>Key Takeaways:</strong></p>



<ol class="wp-block-list">
<li>Google’s Big Sleep AI detected and blocked a critical SQLite 0-day vulnerability (CVE-2025-6965) before it could be exploited.</li>



<li>It marks the first instance of an AI agent proactively stopping live cyber threats in real time.</li>



<li>Leveraged threat intelligence and predictive analysis to anticipate attacks and trigger preemptive mitigation.</li>



<li>Highlights a major shift in cybersecurity—from reactive response to proactive AI-driven defense.</li>
</ol>



<h2 class="wp-block-heading"><strong>Big Sleep AI Prevents SQLite 0-Day Exploitation</strong></h2>



<p>Big Sleep, an AI agent jointly developed by Google DeepMind and Google Project Zero, successfully uncovered the critical SQLite vulnerability CVE-2025-6965 using advanced threat intelligence analysis.</p>



<p>This severe security flaw posed a major threat, as it was previously undisclosed and known only to malicious actors actively preparing to exploit it.</p>



<p>Affecting SQLite, one of the most widely deployed database engines across numerous applications and systems, the vulnerability had far-reaching implications.</p>



<p>Big Sleep identified the flaw by analyzing data from Google Threat Intelligence, leveraging deep insights into evolving attack patterns. Using sophisticated pattern recognition and vulnerability assessment algorithms, the AI agent accurately predicted that the SQLite exploit was on the verge of active use by attackers, enabling timely mitigation.</p>



<p>This proactive discovery enabled Google’s security team to deploy immediate defensive measures and collaborate with SQLite developers to patch the vulnerability before any real-world exploitation could take place.</p>



<p>The milestone marks a paradigm shift in cybersecurity, as Big Sleep has not only met but surpassed expectations, significantly accelerating AI-driven vulnerability research since its launch.</p>



<p>Unlike traditional scanners, Big Sleep uses predictive analysis and real-time threat assessment to uncover zero-day vulnerabilities before they are weaponized—offering a major leap forward in threat prevention.</p>



<p>This achievement builds on the AI system’s growing track record, following its first real-world vulnerability discovery in November 2024, which showcased the tremendous potential of AI to preempt security breaches.</p>



<p>By processing massive volumes of security data, Big Sleep has proven instrumental in safeguarding both Google’s ecosystem and widely-used open-source software from emerging threats.</p>



<p>According to Google’s report, the initiative reflects a strong commitment to responsible AI deployment, emphasizing secure-by-design principles, human oversight, and transparency in automated operations.</p>



<p>This breakthrough sets a new benchmark for proactive cyber defense, with the potential to reshape how organizations counter advanced and evolving cyber threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/big-sleep-ai-blocks-sqlite-0day-vulnerability/">Google’s AI tool Big Sleep has discovered a critical zero-day vulnerability in SQLite and has successfully blocked its active exploitation</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/big-sleep-ai-blocks-sqlite-0day-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical Vulnerability in Anthropic&#8217;s MCP Inspector Exposes AI Developers to Remote Exploits</title>
		<link>https://firsthackersnews.com/critical-vulnerability-anthropic-mcp-inspector-ai-security/</link>
					<comments>https://firsthackersnews.com/critical-vulnerability-anthropic-mcp-inspector-ai-security/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 02 Jul 2025 07:11:51 +0000</pubDate>
				<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#0DayVulnerability]]></category>
		<category><![CDATA[#AISecurity]]></category>
		<category><![CDATA[#Anthropic]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#MCPInspector]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#TechNews]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10348</guid>

					<description><![CDATA[<p>A critical security flaw in Anthropic’s Model Context Protocol (MCP) Inspector tool, identified as CVE-2025-49596, has raised alarms</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/critical-vulnerability-anthropic-mcp-inspector-ai-security/">Critical Vulnerability in Anthropic&#8217;s MCP Inspector Exposes AI Developers to Remote Exploits</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical security flaw in Anthropic’s Model Context Protocol (MCP) Inspector tool, identified as CVE-2025-49596, has raised alarms in the AI development community. This vulnerability, with a CVSS score of 9.4, allows attackers to execute remote code (RCE) on developers’ machines through malicious websites, posing severe risks to AI systems and sensitive data. Discovered by Oligo Security, the flaw exploits a 19-year-old browser vulnerability known as “0.0.0.0-day” combined with inadequate authentication in MCP Inspector’s default settings.</p>



<h2 class="wp-block-heading"><strong>How the Vulnerability Works</strong></h2>



<p>The MCP Inspector, a debugging tool for Anthropic’s open-source Model Context Protocol (introduced in November 2024), lacks proper authentication and encryption by default. Attackers can exploit this by crafting malicious websites that send unauthorized requests to the tool’s Server-Sent Events (SSE) endpoint, enabling arbitrary code execution. This could allow hackers to steal data, install backdoors, or move laterally across networks, endangering AI developers and enterprise systems.</p>



<p>Anthropic responded swiftly, releasing MCP Inspector version 0.14.1 in June 2025, which introduces robust authentication, origin validation, and protections against DNS rebinding and CSRF attacks. Developers are urged to update immediately to mitigate risks.</p>



<h2 class="wp-block-heading"><strong>Why This Matters for AI Security</strong></h2>



<p>This vulnerability highlights the growing cybersecurity challenges in AI development. As AI tools like MCP standardize data integration for large language models (LLMs), unpatched flaws can expose critical infrastructure to exploitation. The discovery underscores the need for secure coding practices and vigilant monitoring in AI ecosystems.</p>



<h2 class="wp-block-heading"><strong>How to Protect Against This Threat</strong></h2>



<p>To safeguard systems, experts recommend:</p>



<ul class="wp-block-list">
<li><strong>Update to MCP Inspector v0.14.1</strong>: Ensure the latest version is installed to eliminate the vulnerability.</li>



<li><strong>Restrict Network Access</strong>: Limit MCP Inspector’s exposure to the internet to prevent unauthorized access.</li>



<li><strong>Monitor for Suspicious Activity</strong>: Watch for unusual network requests or system behavior.</li>



<li><strong>Enhance Browser Security</strong>: Use modern browsers with updated security patches to mitigate “0.0.0.0-day” risks.</li>
</ul>



<p>As AI adoption accelerates, proactive security measures are essential to protect developers and organizations from evolving cyber threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/critical-vulnerability-anthropic-mcp-inspector-ai-security/">Critical Vulnerability in Anthropic&#8217;s MCP Inspector Exposes AI Developers to Remote Exploits</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/critical-vulnerability-anthropic-mcp-inspector-ai-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
