{"uuid": "ffeede52-d28d-4e77-a73d-eebbd80018e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28080", "type": "seen", "source": "https://t.me/TopCyberTechNews/591", "content": "Top Security News for Today\n\nRage Against the Authentication State Machine (CVE-2024-28080)  \nhttps://www.reddit.com/r/netsec/comments/1n31plm/rage_against_the_authentication_state_machine/\n\nHow attackers adapt to built-in macOS protection  \nhttps://securelist.com/macos-security-and-typical-attacks/117367/\n\nCache Me If You Can (Sitecore Experience Platform Cache Poisoning to RCE) - watchTowr Labs  \nhttps://www.reddit.com/r/netsec/comments/1n33j71/cache_me_if_you_can_sitecore_experience_platform/\n\nBaggage Tag Scam  \nhttps://www.schneier.com/blog/archives/2025/08/baggage-tag-scam.html\n\nRansomware gang takedowns causing explosion of new, smaller groups  \nhttps://therecord.media/ransomware-gang-takedown-proliferation\n\nAI Waifu RAT: A Ring3 malware-like RAT based on LLM manipulation is circulating in the wild.  \nhttps://www.reddit.com/r/netsec/comments/1n3a1ll/ai_waifu_rat_a_ring3_malwarelike_rat_based_on_llm/\n\nHidden in plain sight: a misconfigured upload path that invited trouble  \nhttps://www.reddit.com/r/netsec/comments/1n3cu26/hidden_in_plain_sight_a_misconfigured_upload_path/\n\nOperation Serengeti 2.0: Trend Micro Helps Law Enforcement Fight Cybercrime in Africa  \nhttps://www.trendmicro.com/en_us/research/25/h/operation-serengeti-trend-micro.html\n\nScammer steals $1.5 million from Baltimore by spoofing city vendor  \nhttps://therecord.media/scammer-steals-baltimore-city-impersonation-vendor\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-08-30T09:30:25.000000Z"}