Advertisements


The Log4Shell vulnerability: A postmortem

It's essential to reflect on what happened with the Log4Shell vulnerability, what went well, and, critically, what could have gone better. It's essential to reflect on what happened with the Log4Shell vulnerability, what went well, and, criticall.....»»

Category: topSource:  venturebeatJan 22nd, 2022

If you think your robot vacuum is watching you, you might not be wrong

A new report finds a worrisome Ecovacs vulnerability.....»»

Category: topSource:  pcmagRelated NewsOct 4th, 2024

Best practices for implementing threat exposure management, reducing cyber risk exposure

In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional vulnerability management evolves, TEM addresses the overwhelming risks arising.....»»

Category: securitySource:  netsecurityRelated NewsOct 4th, 2024

Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)

CVE-2024-29824, an unauthenticated SQL Injection vulnerability in Ivanti Endpoint Manager (EPM) appliances, is being exploited by attackers, the Cybersecurity and Infrastructure Security Agency has confirmed by adding the bug to its Known Exploited V.....»»

Category: securitySource:  netsecurityRelated NewsOct 3rd, 2024

Attackers exploit critical Zimbra vulnerability using cc’d email addresses

When successful, attacks install a backdoor. Getting it to work reliably is another matter. Attackers are actively exploiting a critical vulnerability in mail servers sold by Zimb.....»»

Category: topSource:  arstechnicaRelated NewsOct 2nd, 2024

Critical Zimbra RCE vulnerability under mass exploitation (CVE-2024-45519)

Attackers are actively exploiting CVE-2024-45519, a critical Zimbra vulnerability that allows them to execute arbitrary commands on vulnerable installations. Proofpoint’s threat researchers say that the attacks started on September 28 – s.....»»

Category: securitySource:  netsecurityRelated NewsOct 2nd, 2024

Balbix D3 accelerates vulnerability mitigation

Balbix unveild Balbix D3, the latest version of its exposure management platform. Packed with AI innovations, Balbix D3 is designed to help cybersecurity teams mitigate critical exposures faster than ever before, protecting organizations against emer.....»»

Category: securitySource:  netsecurityRelated NewsOct 2nd, 2024

Arc Browser had a ‘serious’ security vulnerability, here’s how they’re addressing it

Back in late August, The Browser Company – the company behind the popular Mac browser Arc, became aware of a serious security vulnerability in the browser, one that could allow for remote code execution on other users computer with no direct intera.....»»

Category: topSource:  pcmagRelated NewsSep 28th, 2024

Climate change accelerates vulnerability and loss of resilience of a key species for the Mediterranean ecosystem: Study

A study by the University of Barcelona has analyzed the ability of red gorgonians (Paramuricea clavata), a key species for the Mediterranean marine ecosystem, to resist and recover after marine heat waves......»»

Category: topSource:  informationweekRelated NewsSep 27th, 2024

Arc Browser had a ‘serious’ security vulnerability last month, now patched

Back in late August, The Browser Company – the company behind the popular Mac browser Arc, became aware of a serious security vulnerability in the browser, one that could allow for remote code execution on other users computer with no direct intera.....»»

Category: gadgetSource:  9to5macRelated NewsSep 21st, 2024

Apache HugeGraph-Server flaw actively exploited, CISA warns

The vulnerability has been patched months ago, but now federal agencies have a deadline to patch......»»

Category: topSource:  informationweekRelated NewsSep 20th, 2024

Patch this critical Safeguard for Privileged Passwords auth bypass flaw (CVE-2024-45488)

Researchers have released technical details about CVE-2024-45488, a critical authentication bypass vulnerability affecting One Identity’s Safeguard for Privileged Passwords (SPP), which could allow attackers to gain full administrative access t.....»»

Category: securitySource:  netsecurityRelated NewsSep 19th, 2024

Microsoft confirms second 0-day exploited by Void Banshee APT (CVE-2024-43461)

CVE-2024-43461, a spoofing vulnerability affecting Windows MSHTML – a software component used by various apps for rendering render web pages on Windows – “was exploited as a part of an attack chain relating to CVE-2024-38112, prior.....»»

Category: securitySource:  netsecurityRelated NewsSep 16th, 2024

Week in review: Veeam Backup & Replication RCE could soon be exploited, Microsoft fixes 4 0-days

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711) CVE-2024-40711, a critical vulnerability affecting Ve.....»»

Category: securitySource:  netsecurityRelated NewsSep 15th, 2024

Tenable AI Aware provides exposure insight into AI applications, libraries and plugins

Tenable released AI Aware, advanced detection capabilities designed to surface artificial intelligence solutions, vulnerabilities and weaknesses available in Tenable Vulnerability Management. Tenable AI Aware provides exposure insight into AI applica.....»»

Category: securitySource:  netsecurityRelated NewsSep 11th, 2024

CISA confirms that SonicWall vulnerability is getting exploited (CVE-2024-40766)

The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-40766 – a recently fixed improper access control vulnerability affecting SonicWall’s firewalls – to its Known Exploited Vulnerabilities catalog, thus.....»»

Category: securitySource:  netsecurityRelated NewsSep 10th, 2024

Zyxel fixes critical command injection flaw in EOL NAS devices (CVE-2024-6342)

Users of Zyxel network-attached storage (NAS) devices are urged to implement hotfixes addressing a critical and easily exploited command injection vulnerability (CVE-2024-6342). About CVE-2024-6342 Zyxel NAS devices are generally used by small to med.....»»

Category: securitySource:  netsecurityRelated NewsSep 10th, 2024

Tech stack uniformity has become a systemic vulnerability

Crashes due to faulty updates are nothing new; in fact, one reason IT teams often delay updates is their unreliability and tendency to disrupt the organization’s day-to-day operations. Zero-days are also an old phenomenon. In the past, due to a lac.....»»

Category: securitySource:  netsecurityRelated NewsSep 10th, 2024

Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711)

CVE-2024-40711, a critical vulnerability affecting Veeam Backup & Replication (VBR), could soon be exploited by attackers to steal enterprise data. Discovered and reported by Code WHite researcher Florian Hauser, the vulnerability can be leveraged fo.....»»

Category: securitySource:  netsecurityRelated NewsSep 9th, 2024

Week in review: Vulnerability allows Yubico security keys cloning, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Vulnerability allows Yubico security keys to be cloned Researchers have unearthed a cryptographic vulnerability in popular Yubico (FIDO) hardware se.....»»

Category: securitySource:  netsecurityRelated NewsSep 8th, 2024

Apache OFBiz team patches critical RCE vulnerability (CVE-2024-45195)

For the fourth time in the last five months, Apache OFBiz users have been advised to upgrade their installations to fix a critical flaw (CVE-2024-45195) that could lead to unauthenticated remote code execution. About CVE-2024-45195 Apache OFBiz is an.....»»

Category: securitySource:  netsecurityRelated NewsSep 6th, 2024