A critical vulnerability (CVE-2025-55190, CVSS 10) has been discovered and patched in Argo CD, the popular GitOps continuous delivery platform for Kubernetes. The flaw affects the /api/v1/projects/{project}/detailed endpoint, where API tokens with basic project-level permissions could access sensitive repository credentials—such as usernames and passwords—despite lacking explicit permission to view secrets. The vulnerability allowed tokens with limited roles (e.g., automation roles for syncing or retrieving apps) to call the project details API and obtain credentials for all repositories associated with the project. Even more concerning, this flaw extended beyond project-scoped tokens. According to the advisory, any token with projects get permissions—including global roles—could exploit the issue, exposing secrets unintentionally across environments. The Argo CD team has released fixes in versions v3.1.2, v3.0.14, v2.14.16, and v2.13.9. Exploitation was simple and did not require elevated privileges, making this a high-risk exposure for affected environments. All users are strongly urged to upgrade immediately and review existing tokens, roles, and access control configurations to ensure their systems are not vulnerable to unauthorized secret access.
ESET researchers have uncovered two sophisticated Android spyware campaigns that impersonate Signal and ToTok messaging apps to target users seeking secure communication platforms....
A new malware campaign dubbed SORVEPOTEL is rapidly spreading through WhatsApp messages, primarily targeting Windows systems in Brazil. Instead of focusing on data theft or ransomw...
On 15 October 2023, threat actor GhostSocks advertised a new Malware-as-a-Service (MaaS) on the Russia-based cybercrime forum xss[.]is. The service converts infected Windows PCs in...