shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

245
active users

#zeroday

1 post1 participant0 posts today

🚨 Billions of Chrome & Chromium users are at risk from a new zero-day vulnerability (CVE-2025-4664) that can leak sensitive data! Experts urge everyone to update browsers ASAP & use extra security tools. Stay safe online! 🔒🌐
More info 👉 techradar.com/pro/security/bil
#CyberSecurity #Chrome #ZeroDay #DataProtection #newz

TechRadar · Billions of Chrome users at risk from new data-stealing browser vulnerability - here's how to stay safeBy Efosa Udinmwen

Gee, I was just thinking that if the Sun decides to go "#ZeroDay" on us, that could put the damper on the AI menace that's been unleashed upon the planet...

The U.S. Ran Its First Space Weather Preparedness Drill—Here’s How It Went
Ironically, the exercise last May was interrupted by a real scenario, when Earth was hit by the strongest solar storm in two decades

Margherita Bassi - Daily Correspondent
May 21, 2025

"According to the NASA statement, the exercise demonstrated 'a critical need' for 'more robust forecasting capabilities of space weather drivers and effects.' The report also emphasizes the need to educate the public, continue developing response plans, make critical infrastructure less vulnerable and collaborate with both the private sector and international agencies."

smithsonianmag.com/smart-news/

A few notes on the recently published Google Cloud (ex. Mandiant) Zeroday Report:

Exploit chains made up of multiple zero-day vulnerabilities continue to be almost exclusively (~90%) used to target mobile devices.

2024-zero-day-exploitation-analysis-en, page 7

The proportional increase was even greater, with OS vulnerabilities making up just 17% of total zero- day exploitation in 2023, compared to nearly 30% in 2024.

2024-zero-day-exploitation-analysis-en, page 7

While the absolute number is slightly lower than what we saw in 2023 (36 vulnerabilities), the proportion of enterprise-focused vulnerabilities has risen from 37% in 2023 to 44% in 2024.

2024-zero-day-exploitation-analysis-en, page 9

The variety of targeted enterprise products continues to expand across security and networking products, with notable targets in 2024 including Ivanti Cloud Services Appliance, Palo Alto Networks PAN-OS, Cisco Adaptive Security Appliance, and Ivanti Connect Secure VPN.

2024-zero-day-exploitation-analysis-en, page 9

In 2024, we linked almost 15% (five vulnerabilities) of attributed zero-days to non-state financially motivated groups, including a suspected FIN11 cluster’s exploitation of a zero-day vulnerability in multiple Cleo managed file transfer products (CVE-2024-55956) to conduct data theft extortion. This marks the third year of the last four (2021, 2023, and 2024) in which FIN11 or an associated cluster has exploited a zero-day vulnerability in its operations, almost exclusively in file transfer products.

2024-zero-day-exploitation-analysis-en, page 13

cloud.google.com/blog/topics/t

Google Cloud BlogHello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis | Google Cloud BlogThis Google Threat Intelligence Group report presents an analysis of detected 2024 zero-day exploits.

Breaking news. Spain, Portugal and parts of France hit by massive power outage

""Such a widespread grid failure is extremely unusual and could be caused by a number of things: there could be a physical fault in the grid which brings down power, a coordinated cyber attack could be behind it, or a dramatic imbalance between demand and supply has tipped the grid system over the edge," Taco Engelaar, managing director at energy infrastructure experts Neara told Euronews."

euronews.com/my-europe/2025/04

Huge power cut causes chaos in Spain and Portugal as trains, traffic lights, and payments hit

bbc.co.uk/news/live/c9wpq8xrvd