XStore Documentation

June 02, 2025 – Cyber Briefing

👉 What’s happening in cybersecurity today?

Linux flaws leak password hashes, GitHub code poisons AI with path traversal bugs, and Google Script is used in phishing. Cyberattacks hit Covenant hospitals, Moscow’s internet, and Puerto Rico’s Justice Department. Lawmakers demand CSRB’s return, authorities dismantle malware-evasion services, and Germany unmasks Conti’s alleged leader.

Listen to the full podcast


🚨 Cyber Alerts

1. Linux Core Dump Flaws Risk Password Leaks

The Qualys Threat Research Unit has discovered two critical race condition vulnerabilities, CVE-2025–5054 and CVE-2025–4598, in Linux core dump handlers apport and systemd-coredump. Affecting major distributions like Ubuntu, RHEL, and Fedora, these flaws could allow local attackers to access sensitive data, including password hashes, by manipulating SUID program core dumps. While exploit complexity varies and vendors have issued advisories, Qualys demonstrated proof-of-concept attacks that successfully extracted /etc/shadow content.

2. GitHub Code Flaw Replicated By AI Models

A new research study has identified a widespread path traversal vulnerability in a common Node.js code pattern, affecting 1,756 open-source GitHub projects, many with critical CVSS scores. This flaw, which allows attackers to access files outside restricted directories, propagated through developer resources like Stack Overflow and GitHub Gist due to misconceptions about its security despite occasional concerns. Alarmingly, the study also found that this vulnerable code pattern has “poisoned” large language models, with 95% of tested LLM-generated code samples for static file servers containing the same flaw.

3. Google Script Used In New Phishing Scams

The Cofense Phishing Defense Center has uncovered a strategic phishing campaign where attackers leverage Google Apps Script, a legitimate platform, to host deceptive phishing pages. Masquerading as urgent invoice emails from spoofed domains, these attacks trick recipients into clicking links leading to fake login portals hosted on Google’s trusted script.google.com domain. This method exploits users’ inherent trust in Google’s environment to harvest sensitive credentials, which are then captured via a PHP script and sent to the attackers.

For more alerts, click here!

💥 Cyber Incidents

For more incidents, click here!

Click to See Tools

📢 Cyber News

For more news, click here

📈Cyber Stocks

On Friday, May 30, 2025, Zscaler rose 9.79%, CrowdStrike Holdings gained 2.74%, Palo Alto Networks increased 3.55%, Fortinet dipped 0.25%, and SentinelOne edged up 1.27%.

💡 Cyber Tip

📚 Cyber Book

Click to Check Events

Copyright © 2025 CyberMaterial. All Rights Reserved.

Follow CyberMaterial on:

SubstackLinkedInTwitterRedditInstagramFacebookYouTube, and Medium.

Get Help

Online Scam Prevention & Recovery

Schedule a free consultation

 A free 15-min cybersecurity consultation