{"uuid": "24dd1b47-05e3-42e9-982f-d0b0b0034be8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1732", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/463", "content": "Top Security News for Today\n\nLocal privilege escalation on Zyxel USG FLEX H Series (CVE-2025-1731)  \nhttps://www.reddit.com/r/netsec/comments/1k5roqe/local_privilege_escalation_on_zyxel_usg_flex_h/\n\nRegulating AI Behavior with a Hypervisor  \nhttps://www.schneier.com/blog/archives/2025/04/regulating-ai-behavior-with-a-hypervisor.html\n\nUnderstanding the threat landscape for Kubernetes and containerized assets  \nhttps://www.microsoft.com/en-us/security/blog/2025/04/23/understanding-the-threat-landscape-for-kubernetes-and-containerized-assets/\n\nXRP Supplychain attack: Official NPM package infected with crypto stealing backdoor  \nhttps://www.reddit.com/r/netsec/comments/1k54dna/xrp_supplychain_attack_official_npm_package/\n\nDOGE Worker\u2019s Code Supports NLRB Whistleblower  \nhttps://krebsonsecurity.com/2025/04/doge-workers-code-supports-nlrb-whistleblower/\n\nAuthenticated Remote Code Execution on USG FLEX H Series (CVE-2025-1731 / CVE-2025-1732)  \nhttps://www.reddit.com/r/netsec/comments/1k6f52p/authenticated_remote_code_execution_on_usg_flex_h/\n\nOperation SyncHole: Lazarus APT goes back to the well  \nhttps://securelist.com/operation-synchole-watering-hole-attacks-by-lazarus/116326/\n\nScams 2.0: How Technology Is Powering the Next Generation of Fraud  \nhttps://www.tripwire.com/state-of-security/scams-how-technology-powering-next-generation-fraud\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-04-24T09:30:30.000000Z"}