Tag: vulnerability
-
Acrobat outbounds and Foxit usefree PDF reader vulnerabilities found
by
in SecurityNewsCisco Talos’ Vulnerability Research team recently disclosed three out-of-bounds read vulnerabilities in Adobe Acrobat Reader, and two use-after-free vulnerabilities in Foxit Reader. These vulnerabilities exist in Adobe Acrobat Reader and Foxit Reader, two of the most popular and feature-rich PDF readers on the market. The vulnerabilities First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/acrobat-out-of-bounds-and-foxit-use-after-free-pdf-reader-vulnerabilities-found/
-
CVE-2024-50379: A Critical Race Condition in Apache Tomcat
by
in SecurityNewsAn Apache Tomcat web server vulnerability has been published, exposing the platform to remote code execution through a race condition failure. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/cve-2024-50379-a-critical-race-condition-in-apache-tomcat/
-
Rhode Island officials warn residents as ransomware group threatens social services data leak
by
in SecurityNewsThe personal data of hundreds of thousands of vulnerable residents is at risk after a threat group attacked a state social services database. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/rhode-island-ransomware-social-services/735912/
-
Fortinet warns of FortiWLM bug giving hackers admin privileges
by
in SecurityNewsFortinet has disclosed a critical vulnerability in Fortinet Wireless Manager (FortiWLM) that allows remote attackers to take over devices by executing unauthorized code or commands through specially crafted web requests. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-fortiwlm-bug-giving-hackers-admin-privileges/
-
From reactive to proactive: Redefining incident response with unified, cloud-native XDR
by
in SecurityNewsIn today’s rapidly evolving threat landscape, cybersecurity is a constant game of cat and mouse. The average security operations center (SOC) team receives 4,484 alerts every day and can spend up to 3 hours manually triaging to understand which signals represent a genuine threat and which are just noise.However, this model traps SOCs in a…
-
Kaspersky Uncovers Active Exploitation of Fortinet Vulnerability CVE-2023-48788
by
in SecurityNewsIn a recent investigation, Kaspersky’s Global Emergency Response Team (GERT) uncovered active exploitation of a patched vulnerability in Fortinet FortiClient EMS. This SQL injection vulnerability, identified as CVE-2023-48788, affects FortiClient... First seen on securityonline.info Jump to article: securityonline.info/kaspersky-uncovers-active-exploitation-of-fortinet-vulnerability-cve-2023-48788/
-
Fortinet warns about Critical flaw in Wireless LAN Manager FortiWLM
by
in SecurityNewsFortinet warns of a patched FortiWLM vulnerability that could allow admin access and sensitive information disclosure. Fortinet warned of a now-patched Wireless LAN Manager (FortiWLM) vulnerability, tracked as CVE-2023-34990 (CVSS score of 9.6), that could lead to admin access and sensitive information disclosure. >>A relative path traversal [CWE-23] in FortiWLM may allow a remote, unauthenticated…
-
US eyes ban on TP-Link routers amid cybersecurity concerns
by
in SecurityNews
Tags: attack, business, china, compliance, computer, corporate, country, cyber, cyberattack, cybercrime, cybersecurity, ddos, defense, espionage, exploit, flaw, government, hacking, infrastructure, intelligence, law, malicious, microsoft, network, risk, router, technology, threat, vulnerability, wifiThe US government is investigating TP-Link, a Chinese company that supplies about 65% of routers for American homes and small businesses, amid concerns about national security risks. Reports suggest these routers have vulnerabilities that cybercriminals exploit to compromise sensitive enterprise data.Investigations by the Commerce, Defense, and Justice Departments indicate that the routers may have been…
-
Fortinet Patches Critical FortiWLM Vulnerability
by
in SecurityNewsFortinet has released patches for a critical-severity path traversal vulnerability in FortiWLM that was reported last year. The post Fortinet Patches Critical FortiWLM Vulnerability appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/fortinet-patches-critical-fortiwlm-vulnerability/
-
Turning Insights into Action: The Importance of Vulnerability Remediation after VAPT
by
in SecurityNewsVulnerability Assessment and Penetration Testing (VAPT) has become an essential practice for organizations aiming to secure their digital assets. However, identifying vulnerabilities is only half the battle; the real challenge lies in addressing them effectively. This is where vulnerability remediation comes into play. It is the critical step that turns insights from VAPT into actionable……
-
Malicious Supply Chain Attacking Moving From npm Community To VSCode Marketplace
by
in SecurityNewsResearchers have identified a rise in malicious activity on the VSCode Marketplace, highlighting the vulnerability of the platform to supply chain attacks similar to those previously seen in the npm community. Malicious actors are increasingly exploiting npm packages to distribute malicious code, mirroring tactics previously used in VSCode extensions that involve the npm package etherscancontracthandler,…
-
Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits
by
in SecurityNewsFortinet has issued an advisory for a now-patched critical security flaw impacting Wireless LAN Manager (FortiWLM) that could lead to disclosure of sensitive information.The vulnerability, tracked as CVE-2023-34990, carries a CVSS score of 9.6 out of a maximum of 10.0.”A relative path traversal [CWE-23] in FortiWLM may allow a remote unauthenticated attacker to read sensitive…
-
Exploring vulnerable Windows drivers
by
in SecurityNewsThis post is the result of research into the real-world application of the Bring Your Own Vulnerable Driver (BYOVD) technique along with Cisco Talos’ series of posts about malicious Windows drivers. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/exploring-vulnerable-windows-drivers/
-
Chrome 131 Update Patches High-Severity Memory Safety Bugs
by
in SecurityNewsGoogle has released a Chrome 131 update to patch multiple high-severity memory safety vulnerabilities, including three affecting the V8 JavaScript engine. The post Chrome 131 Update Patches High-Severity Memory Safety Bugs appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/chrome-131-update-patches-high-severity-memory-safety-bugs/
-
Apache Tomcat Conditional Competition Code Execution Vulnerability (CVE-2024-50379)
by
in SecurityNewsOverview Recently, NSFOCUS CERT detected that Apache issued a security announcement, fixing the Apache Tomcat conditional competition code execution vulnerability (CVE-2024-50379). Due to the inconsistency between Windows file system and Tomcat in case-distinguishing processing of paths, when the write function of default servlet is enabled (set readonly=false and allow PUT method), unauthenticated attackers can construct…The…
-
IAM Predictions for 2025: Identity as the Linchpin of Business Resilience
by
in SecurityNews
Tags: access, ai, apple, attack, authentication, banking, breach, business, cloud, compliance, corporate, credentials, crime, data, deep-fake, detection, finance, iam, identity, malicious, microsoft, mobile, office, passkey, password, privacy, regulation, resilience, risk, service, supply-chain, theft, threat, tool, vulnerabilityIAM Predictions for 2025: Identity as the Linchpin of Business Resilience madhav Thu, 12/19/2024 – 05:33 As we look toward 2025, the lessons of 2024 serve as a stark reminder of the rapidly evolving identity and access management (IAM) landscape. The numbers tell the story: The latest Identity Theft Resource Center report indicates that consumers…
-
Vulnerability Exploit Assessment Tool EPSS Exposed to Adversarial Attack
by
in SecurityNewsA Morphisec researcher showed how an attacker could manipulate FIRST’s Exploit Prediction Scoring System (EPSS) using AI First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/epss-exposed-to-adversarial-attack/
-
Wie Unternehmen Open-Source-Komponenten sicher verwenden – Offene Quelle, offene Schwachstelle?
by
in SecurityNewsFirst seen on security-insider.de Jump to article: www.security-insider.de/open-source-sicherheit-unternehmen-schutz-a-249cc2215907caad84226d4b93ea4668/
-
Kritische Lücke in BeyondTrust Privileged Remote Access und Remote Support
by
in SecurityNewsIn aktuellen Versionen von BeyondTrust Privileged Remote Access und Remote Support haben die Entwickler eine gefährliche Schwachstelle geschlossen. First seen on heise.de Jump to article: www.heise.de/news/Kritische-Luecke-in-BeyondTrust-Privileged-Remote-Access-und-Remote-Support-10215447.html
-
Next.js Vulnerability Let Attackers Bypass Authentication
by
in SecurityNewsA high-severity vulnerability has been discovered in the popular web framework, Next.js, which allows attackers to bypass authentication under specific circumstances. The issue, cataloged as CVE-2024-51479, affects versions from 9.5.5 up to 14.2.14. Developers using these versions must quickly upgrade to the patched version 14.2.15 to secure their applications. Authorization Bypass in Next.js ( CVE-2024-51479)…
-
Critical Chrome Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely
by
in SecurityNewsGoogle has released a new security update on the Stable channel, bringing Chrome to version 131.0.6778.204/.205 for Windows and Mac and 131.0.6778.204 for Linux. This update addresses multiple high-severity vulnerabilities, ensuring enhanced safety for users. The rollout will occur gradually over the coming days and weeks. Highlighted Security Fixes The latest Chrome release includes fixes for five vulnerabilities, of…
-
Kritische LDAP-Schwachstelle in Windows (CVE-2024-49112)
by
in SecurityNewsNoch ein kleiner Nachtrag vom Dezember 2024-Patchday. Zum 10. Dezember 2024 hat Microsoft einen kritische Schwachstelle (CVE-2024-49112) im Lightweight Directory Access Protocol (LDAP) öffentlich gemacht. Diese ermöglicht Remote-Angriffe auf Windows-Clients und -Server, wurde aber gepatcht. Es gibt aber eine Reihe … First seen on borncity.com Jump to article: www.borncity.com/blog/2024/12/19/kritische-ldap-schwachstelle-in-windows-cve-2024-49112/
-
Understanding Virtual Skimmers: A Threat to E-Commerce Security
by
in SecurityNewsVirtual skimmers exploit vulnerabilities in websites that process payments online, often without leaving a trace until it’s too late. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/understanding-virtual-skimmers-a-threat-to-e-commerce-security/
-
Chrome Security Update, Patch for Multiple Security Flaws
by
in SecurityNewsGoogle has released a new security update on the Stable channel, bringing Chrome to version 131.0.6778.204/.205 for Windows and Mac and 131.0.6778.204 for Linux. This update addresses multiple high-severity vulnerabilities, ensuring enhanced safety for users. The rollout will occur gradually over the coming days and weeks. Highlighted Security Fixes The latest Chrome release includes fixes for five vulnerabilities, of…
-
DEF CON 32 Exploiting Cloud Provider Vulnerabilities for Initial Access
by
in SecurityNewsAuthor/Presenter: Nick Frichette Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-exploiting-cloud-provider-vulnerabilities-for-initial-access/
-
Die 10 häufigsten LLM-Schwachstellen
by
in SecurityNews
Tags: access, ai, api, application-security, awareness, breach, cloud, control, cyberattack, data, detection, dos, encryption, injection, least-privilege, LLM, ml, monitoring, privacy, RedTeam, remote-code-execution, risk, service, tool, update, vulnerability, zero-trust