#security-vulnerabilities

[ follow ]
#cybersecurity
Information security
fromThe Hacker News
2 months ago

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials

Xerox VersaLink printers have serious security vulnerabilities that can lead to credential theft.
The vulnerabilities can allow attackers to redirect authentication information to rogue servers.
Effective exploitation of these vulnerabilities requires specific conditions, including access to MFP configuration and user address books.
Information security
fromTheregister
4 weeks ago

CISA warns of new malware targeting Ivanti flaw

Ivanti products face a new malware threat called Resurge, exploiting a critical vulnerability. Immediate action is required to protect systems.
Information security
fromThe Hacker News
6 months ago

Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries

Multiple vulnerabilities in MMS protocol can severely impact industrial environments, allowing potential crashes and remote code execution.
Information security
fromTheregister
3 months ago

Security pros baited by fake Windows LDAP exploits

Attackers are using counterfeit proof-of-concept exploits to deliver malware targeting Microsoft security vulnerabilities.
The LDAPNightmare vulnerabilities are of particular concern for security professionals due to their high severity and widespread use in systems.
Information security
fromThe Hacker News
2 months ago

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials

Xerox VersaLink printers have serious security vulnerabilities that can lead to credential theft.
The vulnerabilities can allow attackers to redirect authentication information to rogue servers.
Effective exploitation of these vulnerabilities requires specific conditions, including access to MFP configuration and user address books.
Information security
fromTheregister
4 weeks ago

CISA warns of new malware targeting Ivanti flaw

Ivanti products face a new malware threat called Resurge, exploiting a critical vulnerability. Immediate action is required to protect systems.
Information security
fromThe Hacker News
6 months ago

Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries

Multiple vulnerabilities in MMS protocol can severely impact industrial environments, allowing potential crashes and remote code execution.
Information security
fromTheregister
3 months ago

Security pros baited by fake Windows LDAP exploits

Attackers are using counterfeit proof-of-concept exploits to deliver malware targeting Microsoft security vulnerabilities.
The LDAPNightmare vulnerabilities are of particular concern for security professionals due to their high severity and widespread use in systems.
more#cybersecurity
fromInfoQ
3 days ago
Web frameworks

Spring News Roundup: RCs of Spring Boot, Data, Security, Auth, Session, Integration, Web Services

Recent updates in the Spring ecosystem include significant release candidates for Spring Boot and Spring Data, enhancing features and addressing vulnerabilities.
#software-development
Startup companies
fromTechCrunch
8 months ago

CodeRabbit raises $16M to bring AI to code reviews | TechCrunch

Automation of code reviews using AI can enhance efficiency but faces skepticism regarding effectiveness compared to human reviews.
fromZDNET
2 months ago
Artificial intelligence

How fake security reports are swamping open-source projects, thanks to AI

AI's reliability in coding remains questionable despite increased usage, causing trust issues among developers.
fromDevOps.com
4 months ago
Information security

How an Effective AppSec Program Shifts Your Teams From Fixing to Building - DevOps.com

Effective application security supports innovation and efficiency in development teams.
Integrating security into the development process alleviates the burden of fixing vulnerabilities later.
Collaboration between DevOps and AppSec is essential to balance speed and security.
fromBusiness Matters
2 weeks ago
Privacy professionals

Ensuring Compliance with Industry Standards Through Code Review Services

Code reviews are essential for maintaining compliance and ensuring high-quality software in regulated industries.
fromDevOps.com
5 months ago
Information security

Proactive Dependency Management: Reducing Risk and Improving Software Quality - DevOps.com

Proactive dependency management is essential for secure, high-quality software development.
fromInfoQ
8 months ago
Business intelligence

Spring News Roundup: Milestone Releases for Spring Boot, Cloud, Security, Session and Spring AI

Numerous Spring projects have released updates, enhancing security and functionality, reflecting a dynamic week in the Spring ecosystem.
Startup companies
fromTechCrunch
8 months ago

CodeRabbit raises $16M to bring AI to code reviews | TechCrunch

Automation of code reviews using AI can enhance efficiency but faces skepticism regarding effectiveness compared to human reviews.
fromZDNET
2 months ago
Artificial intelligence

How fake security reports are swamping open-source projects, thanks to AI

AI's reliability in coding remains questionable despite increased usage, causing trust issues among developers.
fromDevOps.com
4 months ago
Information security

How an Effective AppSec Program Shifts Your Teams From Fixing to Building - DevOps.com

Effective application security supports innovation and efficiency in development teams.
Integrating security into the development process alleviates the burden of fixing vulnerabilities later.
Collaboration between DevOps and AppSec is essential to balance speed and security.
fromBusiness Matters
2 weeks ago
Privacy professionals

Ensuring Compliance with Industry Standards Through Code Review Services

Code reviews are essential for maintaining compliance and ensuring high-quality software in regulated industries.
fromDevOps.com
5 months ago
Information security

Proactive Dependency Management: Reducing Risk and Improving Software Quality - DevOps.com

Proactive dependency management is essential for secure, high-quality software development.
fromInfoQ
8 months ago
Business intelligence

Spring News Roundup: Milestone Releases for Spring Boot, Cloud, Security, Session and Spring AI

Numerous Spring projects have released updates, enhancing security and functionality, reflecting a dynamic week in the Spring ecosystem.
more#software-development
London startup
fromDeveloper Tech News
3 weeks ago

Security flaws hit PyTorch Lightning deep learning framework

PyTorch Lightning has critical security flaws due to deserialisation vulnerabilities, potentially allowing arbitrary code execution from untrusted model files.
Gadgets
fromwww.theguardian.com
1 month ago

Hyundai facing legal action over car that can be stolen effortlessly in seconds'

Hyundai is facing lawsuits for not warning customers about easy thefts of its electric cars.
#data-breach
fromSecuritymagazine
1 month ago
Roam Research

27,000 records in Australian fintech database were exposed

An exposed Amazon S3 database for Vroom by YouX contained sensitive records, highlighting severe security risks associated with unprotected data.
fromSecuritymagazine
1 month ago
Roam Research

27,000 records in Australian fintech database were exposed

An exposed Amazon S3 database for Vroom by YouX contained sensitive records, highlighting severe security risks associated with unprotected data.
more#data-breach
#linux
fromITPro
1 month ago
Privacy technologies

Qualys discovers three bypasses of Ubuntu's unprivileged user namespace restrictions

Three flaws in Ubuntu's user namespace restrictions could let local attackers gain full administrative capabilities.
This expands the kernel's attack surface, potentially leading to system exploitation.
fromITPro
1 month ago
Privacy technologies

Qualys discovers three bypasses of Ubuntu's unprivileged user namespace restrictions

Three flaws in Ubuntu's user namespace restrictions could let local attackers gain full administrative capabilities.
This expands the kernel's attack surface, potentially leading to system exploitation.
more#linux
#kubernetes
fromTechzine Global
1 month ago
Information security

An 'IngressNightmare' haunts Kubernetes clusters

Ingress NGINX Controller vulnerabilities expose Kubernetes clusters to unauthorized access, affecting 43% of cloud environments with a CVSS score of 9.8.
fromTheregister
1 month ago
Information security

Public-facing Kubernetes clusters at risk of total takeover

Wiz has identified serious vulnerabilities in the admission controller of Ingress-Nginx Controller, potentially endangering over 6,000 Kubernetes deployments.
Information security
fromTechzine Global
1 month ago

An 'IngressNightmare' haunts Kubernetes clusters

Ingress NGINX Controller vulnerabilities expose Kubernetes clusters to unauthorized access, affecting 43% of cloud environments with a CVSS score of 9.8.
fromTheregister
1 month ago
Information security

Public-facing Kubernetes clusters at risk of total takeover

Wiz has identified serious vulnerabilities in the admission controller of Ingress-Nginx Controller, potentially endangering over 6,000 Kubernetes deployments.
more#kubernetes
Web development
fromSmashing Magazine
2 months ago

How OWASP Helps You Secure Your Full-Stack Web Applications - Smashing Magazine

The OWASP vulnerabilities list is essential for web developers to establish security measures against common threats.
#remote-code-execution
fromComputerWeekly.com
7 months ago
Information security

Printing vulnerability affecting Linux distros raises alarm | Computer Weekly

The newly discovered vulnerabilities in Cups pose a significant security risk to numerous devices, potentially exposing them to remote code execution.
fromZDNET
2 months ago
Information security

Your Netgear Wi-Fi router could be wide open to hackers - install the fix now

Netgear has patched critical security vulnerabilities in several Wi-Fi routers and access points, urging timely updates for user safety.
fromTheregister
3 months ago
Information security

MediaTek says 'Happy New Year' with critical RCE, other bugs

MediaTek disclosed a critical vulnerability affecting 51 chipsets, posing severe security risks to multiple device categories.
fromComputerWeekly.com
7 months ago
Information security

Printing vulnerability affecting Linux distros raises alarm | Computer Weekly

The newly discovered vulnerabilities in Cups pose a significant security risk to numerous devices, potentially exposing them to remote code execution.
fromZDNET
2 months ago
Information security

Your Netgear Wi-Fi router could be wide open to hackers - install the fix now

Netgear has patched critical security vulnerabilities in several Wi-Fi routers and access points, urging timely updates for user safety.
fromTheregister
3 months ago
Information security

MediaTek says 'Happy New Year' with critical RCE, other bugs

MediaTek disclosed a critical vulnerability affecting 51 chipsets, posing severe security risks to multiple device categories.
more#remote-code-execution
#cisco
fromTheregister
2 months ago
Information security

Cisco plugs two Identity Services Engine security holes

Cisco patched two critical vulnerabilities in its Identity Services Engine (ISE) that could allow remote attackers to execute arbitrary commands and access sensitive information.
fromTheregister
8 months ago
Information security

It's time to junk your Cisco SPA300 and SPA500 IP phones

Three critical flaws found in Cisco's Small Business IP phones will not be fixed as the devices are in the end-of-life process.
fromTheregister
2 months ago
Information security

Cisco plugs two Identity Services Engine security holes

Cisco patched two critical vulnerabilities in its Identity Services Engine (ISE) that could allow remote attackers to execute arbitrary commands and access sensitive information.
fromTheregister
8 months ago
Information security

It's time to junk your Cisco SPA300 and SPA500 IP phones

Three critical flaws found in Cisco's Small Business IP phones will not be fixed as the devices are in the end-of-life process.
more#cisco
Information security
fromDevOps.com
3 months ago

The State of Application Risk: Key Findings Reveal Widespread Security Vulnerabilities - DevOps.com

Enterprise software development environments are critically vulnerable, as all organizations face high security risks.
Traditional application security approaches are ineffective against modern threats, leaving organizations exposed.
Artificial intelligence
fromITPro
3 months ago

AI coding tools aren't the solution to the unfolding 'developer crisis' - teams think they can boost productivity and delivery times, but end up bogged down by manual remediation and unsafe code

AI code generation may increase productivity but leads to significant deployment errors and manual tasks.
Developers face increased debugging and security issues due to AI-generated code.
AI tools boost code volume but also the risk associated with bad deployments.
The efficiency benefits of AI in coding are offset by the need for more rigorous quality assurance processes.
Information security
fromThe Hacker News
3 months ago

Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks

A Mirai botnet variant is exploiting a zero-day flaw in industrial routers to conduct DDoS attacks, actively impacting many regions globally.
fromTheregister
6 months ago
Information security

How to trick ChatGPT into writing exploit code using hex

GPT-4o can be exploited through hex encoding to generate malicious code, bypassing security measures designed to prevent harmful outputs.
Information security
fromTechCrunch
6 months ago

Socket lands a fresh $40M to scan software for security flaws | TechCrunch

The software supply chain is currently at high risk, particularly with outdated open-source components leading to security vulnerabilities.
fromwww.nytimes.com
6 months ago
Digital life

Deadly Hezbollah Strike on Army Base Shows Israel's Weakness Against Drones

Hezbollah's recent drone strike on Israel reveals significant gaps in the country's unmanned aircraft detection and defense capabilities.
Information security
fromThe Hacker News
6 months ago

Critical Flaws in Tank Gauge Systems Expose Gas Stations to Remote Attacks

Critical security vulnerabilities in Automatic Tank Gauge systems expose them to remote attacks, posing significant risks to critical infrastructure.
fromThe Hacker News
8 months ago
Information security

Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks

Security vulnerabilities in Ewon Cosy+ could lead to root access, decryption of firmware files, and hijacking VPN sessions.
fromClickUp
8 months ago
UX design

Free Software Evaluation Templates | ClickUp

Software evaluation templates are essential for structuring the evaluation processes of software solutions.
fromThe Cyber Express
8 months ago
Information security

Researchers Bypass Windows Security Smart App Control And SmartScreen

Researchers identified weaknesses in Windows SmartScreen and Smart App Control, showing how attackers can bypass security measures.
fromComputerWeekly.com
9 months ago
Information security

Enhancing mobile app security with behaviour-based biometrics | Computer Weekly

Behaviour-based biometrics analyze unique user patterns for robust security.
fromDevOps.com
11 months ago
Information security

No Country for No-Code: Are We Heading Towards a Wild West of Software Security? - DevOps.com

No-code platforms democratize development but can lead to security vulnerabilities.
fromThe Verge
1 year ago
Information security

Eken fixes "terrible" video doorbell issue that could let someone spy on you

Eken Group issued firmware update for video doorbells with serious security vulnerabilities found by Consumer Reports.
fromArs Technica
1 year ago
JavaScript

Ubuntu 24.04 LTS, Noble Numbat, overhauls its installation and app experience

The absence of vulnerabilities to the XZ backdoor is viewed as a significant aspect of Ubuntu 24.04.
[ Load more ]