Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Error’d: You Talkin’ to Me?

      September 20, 2025

      The Psychology Of Trust In AI: A Guide To Measuring And Designing For User Confidence

      September 20, 2025

      This week in AI updates: OpenAI Codex updates, Claude integration in Xcode 26, and more (September 19, 2025)

      September 20, 2025

      Report: The major factors driving employee disengagement in 2025

      September 20, 2025

      Development Release: Zorin OS 18 Beta

      September 19, 2025

      Distribution Release: IPFire 2.29 Core 197

      September 19, 2025

      Development Release: Ubuntu 25.10 Beta

      September 18, 2025

      Development Release: Linux Mint 7 Beta “LMDE”

      September 18, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Student Performance Prediction System using Python Machine Learning (ML)

      September 21, 2025
      Recent

      Student Performance Prediction System using Python Machine Learning (ML)

      September 21, 2025

      The attack on the npm ecosystem continues

      September 20, 2025

      Feature Highlight

      September 20, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Hyprland Made Easy: Preconfigured Beautiful Distros

      September 20, 2025
      Recent

      Hyprland Made Easy: Preconfigured Beautiful Distros

      September 20, 2025

      Development Release: Zorin OS 18 Beta

      September 19, 2025

      Distribution Release: IPFire 2.29 Core 197

      September 19, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Krispy Kreme hack exposed sensitive data of over 160,000 people

    Krispy Kreme hack exposed sensitive data of over 160,000 people

    June 20, 2025

    Krispy Kreme, the dispenser of delectable doughnuts, has revealed that an astonishingly wide range of personal information belonging to past and present employees, as well as members of their families, was accessed by hackers during a cyber attack last year.

    Read more in my article on the Hot for Security blog.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleQilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
    Next Article Oxford City Council Cyberattack Disrupts Services and Exposes Historic Election Data

    Related Posts

    Development

    Student Performance Prediction System using Python Machine Learning (ML)

    September 21, 2025
    Development

    The attack on the npm ecosystem continues

    September 20, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-40722 – Flatboard Pro Stored XSS

    Common Vulnerabilities and Exposures (CVEs)

    Building Trust with Explainable AI: Why Transparency Is the Future of Intelligent Business🔍

    Web Development

    DIY Branding vs. Working With a Design Agency

    Web Development

    tui mines – text-based mine sweeping puzzle game

    Linux

    Highlights

    CVE-2025-27818 – Apache Kafka LdapLoginModule Deserialization Vulnerability

    June 10, 2025

    CVE ID : CVE-2025-27818

    Published : June 10, 2025, 8:15 a.m. | 1 hour, 29 minutes ago

    Description : A possible security vulnerability has been identified in Apache Kafka.
    This requires access to a alterConfig to the cluster resource, or Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config
    and a SASL-based security protocol, which has been possible on Kafka clusters since Apache Kafka 2.0.0 (Kafka Connect 2.3.0).
    When configuring the broker via config file or AlterConfig command, or connector via the Kafka Kafka Connect REST API, an authenticated operator can set the `sasl.jaas.config`
    property for any of the connector’s Kafka clients to “com.sun.security.auth.module.LdapLoginModule”, which can be done via the
    `producer.override.sasl.jaas.config`, `consumer.override.sasl.jaas.config`, or `admin.override.sasl.jaas.config` properties.
    This will allow the server to connect to the attacker’s LDAP server
    and deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafka connect server.
    Attacker can cause unrestricted deserialization of untrusted data (or) RCE vulnerability when there are gadgets in the classpath.

    Since Apache Kafka 3.0.0, users are allowed to specify these properties in connector configurations for Kafka Connect clusters running with out-of-the-box
    configurations. Before Apache Kafka 3.0.0, users may not specify these properties unless the Kafka Connect cluster has been reconfigured with a connector
    client override policy that permits them.

    Since Apache Kafka 3.9.1/4.0.0, we have added a system property (“-Dorg.apache.kafka.disallowed.login.modules”) to disable the problematic login modules usage
    in SASL JAAS configuration. Also by default “com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule” are disabled in Apache Kafka Connect 3.9.1/4.0.0.

    We advise the Kafka users to validate connector configurations and only allow trusted LDAP configurations. Also examine connector dependencies for
    vulnerable versions and either upgrade their connectors, upgrading that specific dependency, or removing the connectors as options for remediation. Finally,
    in addition to leveraging the “org.apache.kafka.disallowed.login.modules” system property, Kafka Connect users can also implement their own connector
    client config override policy, which can be used to control which Kafka client properties can be overridden directly in a connector config and which cannot.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-45859 – TOTOLINK A3002R Buffer Overflow

    May 13, 2025
    Last Week in AI #306: Astrocade, Llama 4, Nova Act

    Last Week in AI #306: Astrocade, Llama 4, Nova Act

    April 8, 2025

    CVE-2025-46738 – Apache SEL arbitrary code execution vulnerability

    May 12, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.