Sorry. It was not paywalled for me when I first saw. More info from different source: https://feedly.com/cve/CVE-2025-6545
7
Hunters International Ransomware Is Not Shutting Down, It’s Rebranding - Infosecurity Magazine
(www.infosecurity-magazine.com)
75
Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware
(cybersecuritynews.com)
7
New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
(cybersecuritynews.com)
29
Linux Users Urged to Patch Critical Sudo CVE - Infosecurity Magazine
(www.infosecurity-magazine.com)
9
North Korean Hackers Target Crypto Firms with Novel macOS Malware - Infosecurity Magazine
(www.infosecurity-magazine.com)
The incident occurred on June 12, 2025, due to a policy change that contained blank fields, causing 503 errors in Google Cloud and Google Workspace APIs. The root cause was:
- A new feature added to Service Control on May 29, 2025, without adequate error handling.
- The policy change with blank fields was globally replicated and caused Service Control binaries to crash.
Thanks! Corrected
The first vulnerability, CVE-2025-5054, affects Ubuntu’s Apport crash reporting system, while the second, CVE-2025-4598, impacts systemd-coredump, the default core dump handler used across Red Hat Enterprise Linux 9 and 10, as well as Fedora distributions.
view more: next ›
https://feedly.com/cve/CVE-2025-6547