#vulnerabilities

[ follow ]
Information security
fromTheregister
5 days ago

Claude Code runs code to test if is safe, which has risks

Automated security reviews can find simple vulnerabilities but may miss complex exploits, be deceived by crafted code, and introduce risk by executing tests.
fromDevOps.com
1 week ago

Report: ChatGPT-5 Coding Gains Come at a Higher Cost - DevOps.com

Based on over 4,400 Java tasks, the report finds that depending on which of the four levels of reasoning capabilities that OpenAI now makes available, the overall quality of the code, especially in terms of the vulnerabilities generated, significantly improves. However, the overall volume of code being generated per task also substantially increases, which creates additional maintenance challenges for application developers that are not going to be familiar with how code might have been constructed in the first place.
Artificial intelligence
#cybersecurity
Privacy technologies
fromThe Hacker News
1 month ago

Linux-Based Lenovo Webcams' Flaw Can Be Remotely Exploited for BadUSB Attacks

Lenovo webcams have vulnerabilities allowing remote attackers to perform keystroke injections and execute commands independently of the operating system.
Privacy professionals
fromThe Hacker News
1 month ago

CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials

Vulnerabilities in CyberArk and HashiCorp vaults enable severe security risks, including identity theft and remote code execution.
Information security
fromSecurityWeek
1 month ago

Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution

Xerox patched two serious vulnerabilities in FreeFlow Core that allow remote attackers to execute arbitrary code.
Software development
fromDevOps.com
1 month ago

Sonar Surfaces Multiple Caveats When Relying on LLMs to Write Code - DevOps.com

Large language models generate syntactically correct code but introduce significant security vulnerabilities.
Java
fromInfoQ
4 weeks ago

Java News Roundup: Spring Framework, Spring Data, Open Liberty, Hibernate Reactive, Quarkus, Gradle

Java development continues to evolve with major releases and updates in frameworks and libraries.
fromArs Technica
1 month ago

Encryption made for police and military radios may be easily cracked

At least one implementation of the end-to-end encryption solution endorsed by ETSI has a similar issue that makes it equally vulnerable to eavesdropping.
Privacy technologies
Artificial intelligence
fromNextgov.com
1 month ago

DARPA unveils winners of AI challenge to boost critical infrastructure cybersecurity

AI Cyber Challenge announced winners focusing on AI models for identifying and patching vulnerabilities in critical infrastructure code.
Apple
fromstupidDOPE | Est. 2008
1 month ago

Update Your iPhone Now: iOS 18.6 Patches 29 Serious Security Flaws | stupidDOPE | Est. 2008

iOS 18.6 is crucial for iPhone security, fixing 29 vulnerabilities, particularly in Safari and WebKit.
fromTheregister
1 month ago

CISA releases malware analysis for Sharepoint Server attack

CISA analysed six files including two Dynamic Link-Library (.DLL), one cryptographic key stealer, and three web shells. Cyber threat actors could leverage this malware to steal cryptographic keys and execute a Base64-encoded PowerShell command to fingerprint host system and exfiltrate data.
Privacy professionals
fromTheregister
1 month ago

Nvidia patches bug chain leading to total Triton takeover

The first vulnerability (CVE-2025-23320 - 7.5) relates to a bug in the Python backend, triggered by exceeding the shared memory limit, using a very large request.
Information security
#ai-security
fromInfoQ
1 month ago
Privacy technologies

"A Security Nightmare": Docker Warns of Risks in MCP Toolchains

fromInfoQ
1 month ago
Privacy technologies

"A Security Nightmare": Docker Warns of Risks in MCP Toolchains

fromTheregister
1 month ago

Blame a leak for Microsoft SharePoint attacks: researcher

A leak happened here somewhere,” Dustin Childs, head of threat awareness at Trend Micro's Zero Day Initiative (ZDI), told The Register. “And now you’ve got a zero-day exploit in the wild, and worse than that, you’ve got a zero-day exploit in the wild that bypasses the patch, which came out the next day.
Privacy professionals
#sharepoint
#microsoft
fromZDNET
1 month ago
Information security

Microsoft fixes two SharePoint zero-days under attack, but one is still unresolved - how to patch

fromZDNET
1 month ago
Information security

Microsoft fixes two SharePoint zero-days under attack, but one is still unresolved - how to patch

Privacy professionals
fromForbes
1 month ago

Security Debt Is The New Tech Debt-And It's Already Compounding

Accumulation of unaddressed vulnerabilities and misconfigurations leads to security debt, which poses significant risks to organizations.
#cisco
fromTechzine Global
1 month ago

Chinese cyber espionage groups target strategic sectors

In the first half of 2025, it was observed that groups affiliated with China targeted key sectors like telecommunications and semiconductors through advanced cyber espionage activities.
Privacy professionals
fromTechzine Global
2 months ago

An average of 131 CVE reports per day

The number of CVE reports is projected to exceed 40,000 in 2025, with an average of 131 reports per day observed in early 2025.
Information security
fromSecuritymagazine
2 months ago

Sudo Vulnerability Discovered, May Exposes Linux Systems

CVE-2025-32462 has received a lower CVSS score due to the conditions that are needed. Namely, successful execution would require someone to make a misconfiguration and deploy a Sudoers file with an incorrect host for this vulnerability to work.
Privacy professionals
fromArs Technica
2 months ago

Critical CitrixBleed 2 vulnerability has been under active exploit for weeks

Cybersecurity researchers revealed that a critical vulnerability, CVE-2025-5777, in Citrix network management devices has been exploited for over a month, contradicting Citrix's claims.
Privacy professionals
fromForbes
5 months ago

Hackers Bypass Windows Defender Security - What You Need To Know

Bobby Cooke from IBM X-Force Red confirmed that the Microsoft Teams application was 'a viable WDAC bypass,' demonstrating significant security vulnerabilities in Windows Defender.
Information security
Online Community Development
fromIT Pro
2 months ago

MCP servers used by developers and 'vibe coders' are riddled with vulnerabilities - here's what you need to know

MCP servers are highly vulnerable due to their misconfiguration, risking sensitive assets and enabling unauthorized remote access.
The prevalence of vulnerabilities such as 'NeighborJack' highlights the need for better security measures in MCP server deployments.
UK news
fromIndependent
2 months ago

David W Higgins: No, we're not on the cusp of WWIII, but that doesn't mean I'd rule out the possibility of ration cards

Investing in vulnerabilities is wiser than boosting defense spending.
Nuclear weapons development resembles a plot from a spy thriller.
Two nuclear detonations in history highlight the grave risks.
Information security
fromThe Hacker News
3 months ago

Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

Over 20 configuration vulnerabilities in Salesforce Industry Cloud expose sensitive data to unauthorized access.
Information security
fromArs Technica
3 months ago

Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them.

Microsoft patched a critical Secure Boot vulnerability that enables malware installation before OS loading, affecting over 50 device manufacturers.
fromZero Day Initiative
3 months ago

Zero Day Initiative - The June 2025 Security Update Review

Adobe's June 2025 updates address 254 CVEs across multiple products, prioritizing those in Commerce and introducing a substantial fix for Experience Manager, despite no known exploits.
Web frameworks
[ Load more ]