<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Breaches &amp; Zero-Days on Osmond van Hemert</title><link>https://www.osmondvanhemert.nl/series/breaches--zero-days/</link><description>Recent content in Breaches &amp; Zero-Days on Osmond van Hemert</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© Osmond van Hemert. All rights reserved.</copyright><lastBuildDate>Thu, 13 Nov 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://www.osmondvanhemert.nl/series/breaches--zero-days/index.xml" rel="self" type="application/rss+xml"/><item><title>The Zero-Day Treadmill — Why Patch Tuesday Still Matters in 2025</title><link>https://www.osmondvanhemert.nl/posts/251113-zero-day-treadmill-patch-tuesday/</link><pubDate>Thu, 13 Nov 2025 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/251113-zero-day-treadmill-patch-tuesday/</guid><description>November&amp;rsquo;s Patch Tuesday brought critical zero-days being actively exploited, reminding us that patch management is still the unglamorous foundation of security.</description></item><item><title>The Spring 2025 Exploit Wave — Fortinet, Ivanti, and the Perimeter Problem</title><link>https://www.osmondvanhemert.nl/posts/250424-spring-2025-exploit-wave-fortinet-ivanti/</link><pubDate>Thu, 24 Apr 2025 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/250424-spring-2025-exploit-wave-fortinet-ivanti/</guid><description>A surge of active exploitation targeting Fortinet and Ivanti edge devices highlights the persistent vulnerability of network perimeter infrastructure.</description></item><item><title>Salt Typhoon and the Treasury Breach — State-Sponsored Hacking Hits Home</title><link>https://www.osmondvanhemert.nl/posts/250102-salt-typhoon-treasury-breach/</link><pubDate>Thu, 02 Jan 2025 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/250102-salt-typhoon-treasury-breach/</guid><description>The Chinese state-sponsored Salt Typhoon campaign breached the US Treasury Department, exposing how even the most security-conscious organizations remain vulnerable.</description></item><item><title>Salt Typhoon — The Telecom Hack That Should Worry Every Engineer</title><link>https://www.osmondvanhemert.nl/posts/241219-salt-typhoon-telecom-hack/</link><pubDate>Thu, 19 Dec 2024 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/241219-salt-typhoon-telecom-hack/</guid><description>The Salt Typhoon campaign has compromised major US telecoms at a staggering scale. What developers and architects need to understand about this ongoing threat.</description></item><item><title>Salt Typhoon and the Telecom Breach — Infrastructure Under Siege</title><link>https://www.osmondvanhemert.nl/posts/241114-salt-typhoon-telecom-breach/</link><pubDate>Thu, 14 Nov 2024 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/241114-salt-typhoon-telecom-breach/</guid><description>The Salt Typhoon campaign has compromised major US telecom providers, exposing the fragility of critical infrastructure and the growing sophistication of state-sponsored cyber operations.</description></item><item><title>Operation Cronos — The LockBit Takedown and What It Means for Cybersecurity</title><link>https://www.osmondvanhemert.nl/posts/240222-lockbit-takedown-operation-cronos/</link><pubDate>Thu, 22 Feb 2024 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/240222-lockbit-takedown-operation-cronos/</guid><description>An international law enforcement coalition takes down the LockBit ransomware group&amp;rsquo;s infrastructure in a landmark operation.</description></item><item><title>Jenkins Under Fire — CVE-2024-23897 and the Cost of Legacy Infrastructure</title><link>https://www.osmondvanhemert.nl/posts/240125-jenkins-cve-2024-23897-cicd-security/</link><pubDate>Thu, 25 Jan 2024 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/240125-jenkins-cve-2024-23897-cicd-security/</guid><description>A critical Jenkins vulnerability allows arbitrary file reads through the CLI. Here&amp;rsquo;s why this matters more than your typical CVE and what it reveals about CI/CD security.</description></item><item><title>ICBC Ransomware Attack — When the World's Largest Bank Gets Hit</title><link>https://www.osmondvanhemert.nl/posts/231116-icbc-lockbit-ransomware-attack/</link><pubDate>Thu, 16 Nov 2023 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/231116-icbc-lockbit-ransomware-attack/</guid><description>The LockBit ransomware attack on ICBC&amp;rsquo;s US operations disrupted Treasury market trading and exposed critical vulnerabilities in financial infrastructure.</description></item><item><title>HTTP/2 Rapid Reset — The Zero-Day That Hit Everyone</title><link>https://www.osmondvanhemert.nl/posts/231012-http2-rapid-reset-attack/</link><pubDate>Thu, 12 Oct 2023 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/231012-http2-rapid-reset-attack/</guid><description>CVE-2023-44487 exploits a fundamental aspect of HTTP/2 to enable record-breaking DDoS attacks. Here&amp;rsquo;s what you need to know and do.</description></item><item><title>The MGM Resorts Hack — A $100M Lesson in Social Engineering</title><link>https://www.osmondvanhemert.nl/posts/230921-mgm-resorts-social-engineering-attack/</link><pubDate>Thu, 21 Sep 2023 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/230921-mgm-resorts-social-engineering-attack/</guid><description>The MGM Resorts cyberattack that started with a phone call is a stark reminder that the most sophisticated defenses can be undone by human vulnerability.</description></item><item><title>Intel's Downfall Vulnerability — Another Speculative Execution Headache</title><link>https://www.osmondvanhemert.nl/posts/230803-intel-downfall-cpu-vulnerability/</link><pubDate>Thu, 03 Aug 2023 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/230803-intel-downfall-cpu-vulnerability/</guid><description>A new Intel CPU vulnerability called Downfall exposes sensitive data through speculative execution, and the performance impact of mitigations is significant.</description></item><item><title>ESXiArgs Ransomware — A Wake-Up Call for VMware Infrastructure</title><link>https://www.osmondvanhemert.nl/posts/230202-esxiargs-ransomware-vmware-esxi/</link><pubDate>Thu, 02 Feb 2023 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/230202-esxiargs-ransomware-vmware-esxi/</guid><description>A massive ransomware campaign is exploiting a two-year-old VMware ESXi vulnerability, and the scale of unpatched systems is alarming.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/230202-esxiargs-ransomware-vmware-esxi/featured.jpg"/></item><item><title>LastPass Breach Goes From Bad to Catastrophic — Customer Vaults Compromised</title><link>https://www.osmondvanhemert.nl/posts/221222-lastpass-breach-vault-data/</link><pubDate>Thu, 22 Dec 2022 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/221222-lastpass-breach-vault-data/</guid><description>LastPass reveals attackers obtained copies of customer vault data, turning an already serious breach into one of the worst password manager incidents in history.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/221222-lastpass-breach-vault-data/featured.jpg"/></item><item><title>OpenSSL's Critical Vulnerability — Lessons From a Week of Preparation</title><link>https://www.osmondvanhemert.nl/posts/221103-openssl-critical-vulnerability-response/</link><pubDate>Thu, 03 Nov 2022 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/221103-openssl-critical-vulnerability-response/</guid><description>The OpenSSL 3.0.7 patch for CVE-2022-3602 and CVE-2022-3786 arrived this week — here&amp;rsquo;s what happened and what it teaches us about vulnerability response.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/221103-openssl-critical-vulnerability-response/featured.jpg"/></item><item><title>The Uber Breach — When MFA Isn't Enough</title><link>https://www.osmondvanhemert.nl/posts/220915-uber-breach-social-engineering/</link><pubDate>Thu, 15 Sep 2022 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/220915-uber-breach-social-engineering/</guid><description>A teenager allegedly breached Uber&amp;rsquo;s internal systems through social engineering and MFA fatigue, exposing fundamental weaknesses in how we think about authentication.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/220915-uber-breach-social-engineering/featured.jpg"/></item><item><title>Twilio's Phishing Breach — Why SMS-Based 2FA Is Living on Borrowed Time</title><link>https://www.osmondvanhemert.nl/posts/220804-twilio-phishing-breach/</link><pubDate>Thu, 04 Aug 2022 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/220804-twilio-phishing-breach/</guid><description>Twilio&amp;rsquo;s breach through a sophisticated phishing attack targeting employees raises hard questions about SMS-based authentication and supply chain trust.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/220804-twilio-phishing-breach/featured.jpg"/></item><item><title>Follina — The Zero-Day That Turns a Word Doc Into a Weapon</title><link>https://www.osmondvanhemert.nl/posts/220602-follina-zero-day-msdt/</link><pubDate>Thu, 02 Jun 2022 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/220602-follina-zero-day-msdt/</guid><description>CVE-2022-30190, dubbed Follina, exploits Microsoft&amp;rsquo;s diagnostic tool through Office documents — no macros required.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/220602-follina-zero-day-msdt/featured.jpg"/></item><item><title>Spring4Shell Is Here — Assessing the Real Risk of CVE-2022-22965</title><link>https://www.osmondvanhemert.nl/posts/220331-spring4shell-cve-2022-22965/</link><pubDate>Thu, 31 Mar 2022 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/220331-spring4shell-cve-2022-22965/</guid><description>A critical RCE vulnerability in Spring Framework has the internet in panic mode, but the actual risk profile is more nuanced than the Log4Shell comparisons suggest.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/220331-spring4shell-cve-2022-22965/featured.jpg"/></item><item><title>Confluence Under Siege — CVE-2021-26084 and the Self-Hosted Software Problem</title><link>https://www.osmondvanhemert.nl/posts/210902-confluence-rce-cve-2021-26084/</link><pubDate>Thu, 02 Sep 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/210902-confluence-rce-cve-2021-26084/</guid><description>The critical Confluence Server RCE vulnerability is being actively exploited in the wild, raising urgent questions about the sustainability of self-hosted enterprise software.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/210902-confluence-rce-cve-2021-26084/featured.jpg"/></item><item><title>T-Mobile's Massive Data Breach — A Wake-Up Call for API Security</title><link>https://www.osmondvanhemert.nl/posts/210819-tmobile-data-breach-api-security/</link><pubDate>Thu, 19 Aug 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/210819-tmobile-data-breach-api-security/</guid><description>The T-Mobile breach exposing 40+ million records highlights systemic failures in API security and data protection that the entire industry needs to address.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/210819-tmobile-data-breach-api-security/featured.jpg"/></item><item><title>Pegasus Spyware — Zero-Click Exploits and What They Mean for Software Security</title><link>https://www.osmondvanhemert.nl/posts/210715-pegasus-spyware-zero-click-exploits/</link><pubDate>Thu, 15 Jul 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/210715-pegasus-spyware-zero-click-exploits/</guid><description>The Pegasus Project revelations expose industrial-grade zero-click exploits targeting journalists and activists — and raise uncomfortable questions about software supply chains.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/210715-pegasus-spyware-zero-click-exploits/featured.jpg"/></item><item><title>Colonial Pipeline Ransomware — When Cybersecurity Meets Critical Infrastructure</title><link>https://www.osmondvanhemert.nl/posts/210506-colonial-pipeline-ransomware/</link><pubDate>Thu, 06 May 2021 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/210506-colonial-pipeline-ransomware/</guid><description>The Colonial Pipeline ransomware attack exposes how deeply intertwined our digital infrastructure has become with physical systems we take for granted.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/210506-colonial-pipeline-ransomware/featured.jpg"/></item><item><title>FireEye Breach — When the Red Team Gets Red-Teamed</title><link>https://www.osmondvanhemert.nl/posts/201210-fireeye-breach-red-team-tools/</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/201210-fireeye-breach-red-team-tools/</guid><description>FireEye discloses that sophisticated attackers stole their red team tools. The implications for the security industry — and every organization using those tools — are serious.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/201210-fireeye-breach-red-team-tools/featured.jpg"/></item><item><title>Zerologon — The 10-Out-of-10 Vulnerability That Should Terrify You</title><link>https://www.osmondvanhemert.nl/posts/200910-zerologon-cve-2020-1472/</link><pubDate>Thu, 10 Sep 2020 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/200910-zerologon-cve-2020-1472/</guid><description>CVE-2020-1472, dubbed Zerologon, scores a perfect 10.0 CVSS and allows full domain takeover with a handful of packets. Here&amp;rsquo;s what you need to know.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/200910-zerologon-cve-2020-1472/featured.jpg"/></item><item><title>The Twitter Bitcoin Hack — A Social Engineering Masterclass</title><link>https://www.osmondvanhemert.nl/posts/200716-twitter-bitcoin-hack-social-engineering/</link><pubDate>Thu, 16 Jul 2020 00:00:00 +0000</pubDate><guid>https://www.osmondvanhemert.nl/posts/200716-twitter-bitcoin-hack-social-engineering/</guid><description>The massive Twitter compromise that hit Barack Obama, Elon Musk, and Apple wasn&amp;rsquo;t a sophisticated zero-day — it was social engineering targeting internal tools. That&amp;rsquo;s the scary part.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://www.osmondvanhemert.nl/posts/200716-twitter-bitcoin-hack-social-engineering/featured.jpg"/></item></channel></rss>