#vulnerabilities

[ follow ]
fromTheregister
5 days ago

Blame a leak for Microsoft SharePoint attacks: researcher

A leak happened here somewhere,” Dustin Childs, head of threat awareness at Trend Micro's Zero Day Initiative (ZDI), told The Register. “And now you’ve got a zero-day exploit in the wild, and worse than that, you’ve got a zero-day exploit in the wild that bypasses the patch, which came out the next day.
Privacy professionals
#ransomware
Information security
fromTechzine Global
2 months ago

Ransomware groups join attacks on SAP NetWeaver

Ransomware groups are increasingly targeting SAP NetWeaver vulnerabilities for potential attacks.
Recent security exploits include new developments from both Russian and Chinese hacker groups.
#cybersecurity
fromWIRED
1 week ago
Information security

Microsoft Put Older Versions of SharePoint on Life Support. Hackers Are Taking Advantage

Privacy professionals
fromNextgov.com
1 week ago

Chinese hackers are exploiting SharePoint vulnerabilities, Microsoft says

Chinese hackers are exploiting vulnerabilities in Microsoft SharePoint, specifically affecting on-premises versions.
US politics
fromSocial Media Today
1 week ago

Ongoing Chinese Influence Operations Suggest That TikTok Remains a Risk

Chinese nation-state actors are exploiting vulnerabilities in SharePoint servers and conducting influence operations on U.S. voters.
fromWIRED
1 week ago
Information security

Microsoft Put Older Versions of SharePoint on Life Support. Hackers Are Taking Advantage

#sharepoint
fromIT Pro
1 week ago
Privacy technologies

SharePoint flaw: Microsoft says hackers deploying ransomware

fromIT Pro
1 week ago
Privacy technologies

SharePoint flaw: Microsoft says hackers deploying ransomware

#microsoft
fromZDNET
1 week ago
Information security

Microsoft fixes two SharePoint zero-days under attack, but one is still unresolved - how to patch

fromZDNET
1 week ago
Information security

Microsoft fixes two SharePoint zero-days under attack, but one is still unresolved - how to patch

fromForbes
1 week ago

Security Debt Is The New Tech Debt-And It's Already Compounding

Accumulation of unaddressed vulnerabilities and misconfigurations leads to security debt, which poses significant risks to organizations.
#cisco
fromSecuritymagazine
1 week ago

Proximity Cards Are a Liability: The Urgent Beed to Modernize Access Control

Data compromises have reached over 1.3 billion individuals in 2024, with vulnerabilities primarily linked to initial access.
fromTechzine Global
1 week ago

Chinese cyber espionage groups target strategic sectors

In the first half of 2025, it was observed that groups affiliated with China targeted key sectors like telecommunications and semiconductors through advanced cyber espionage activities.
Privacy professionals
fromTechzine Global
2 weeks ago

An average of 131 CVE reports per day

The number of CVE reports is projected to exceed 40,000 in 2025, with an average of 131 reports per day observed in early 2025.
Information security
#software-security
fromIT Pro
2 months ago
Software development

Shifting left might improve software security, but developers are becoming overwhelmed - communication barriers, tool sprawl, and 'vulnerability overload' is causing serious headaches for development teams

fromIT Pro
2 months ago
Software development

Shifting left might improve software security, but developers are becoming overwhelmed - communication barriers, tool sprawl, and 'vulnerability overload' is causing serious headaches for development teams

fromSecuritymagazine
2 weeks ago

Sudo Vulnerability Discovered, May Exposes Linux Systems

CVE-2025-32462 has received a lower CVSS score due to the conditions that are needed. Namely, successful execution would require someone to make a misconfiguration and deploy a Sudoers file with an incorrect host for this vulnerability to work.
Privacy professionals
fromArs Technica
3 weeks ago

Critical CitrixBleed 2 vulnerability has been under active exploit for weeks

Cybersecurity researchers revealed that a critical vulnerability, CVE-2025-5777, in Citrix network management devices has been exploited for over a month, contradicting Citrix's claims.
Privacy professionals
#ai-security
fromForbes
3 months ago

Hackers Bypass Windows Defender Security - What You Need To Know

Bobby Cooke from IBM X-Force Red confirmed that the Microsoft Teams application was 'a viable WDAC bypass,' demonstrating significant security vulnerabilities in Windows Defender.
Information security
Online Community Development
fromIT Pro
1 month ago

MCP servers used by developers and 'vibe coders' are riddled with vulnerabilities - here's what you need to know

MCP servers are highly vulnerable due to their misconfiguration, risking sensitive assets and enabling unauthorized remote access.
The prevalence of vulnerabilities such as 'NeighborJack' highlights the need for better security measures in MCP server deployments.
fromIndependent
1 month ago

David W Higgins: No, we're not on the cusp of WWIII, but that doesn't mean I'd rule out the possibility of ration cards

Investing in vulnerabilities is wiser than boosting defense spending.
Nuclear weapons development resembles a plot from a spy thriller.
Two nuclear detonations in history highlight the grave risks.
fromTheregister
1 month ago

Former US Army Sergeant admits he sold secrets to China

A former US Army sergeant pled guilty to trying to sell classified data to China after exploiting his top-secret clearance.
fromThe Hacker News
1 month ago

Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

Cybersecurity researchers discovered over 20 misconfigurations in Salesforce Industry Cloud, putting sensitive data at risk of exposure to unauthorized access.
Information security
fromArs Technica
1 month ago

Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them.

Microsoft patched a critical Secure Boot vulnerability that enables malware installation before OS loading, affecting over 50 device manufacturers.
fromZero Day Initiative
1 month ago

Zero Day Initiative - The June 2025 Security Update Review

Adobe's June 2025 updates address 254 CVEs across multiple products, prioritizing those in Commerce and introducing a substantial fix for Experience Manager, despite no known exploits.
Web frameworks
fromSecuritymagazine
1 month ago

84% of Organizations Are Now Using AI in the Cloud

The Orca Security report reveals that while AI adoption in cloud environments has reached 84%, 62% of organizations still have vulnerable AI packages, highlighting significant security risks.
Information security
fromHackernoon
1 month ago

The HackerNoon Newsletter: What to Do While I Wait for Claude (6/7/2025) | HackerNoon

Startups often misuse AI, repeating the same mistakes instead of leveraging it effectively.
Awareness of expired domains and obsolete JavaScript is crucial to prevent security vulnerabilities.
Information security
fromDevOps.com
1 month ago

Survey Surfaces Uneven Adoption of SBOMs to Secure Software - DevOps.com

Many organizations are struggling to meet SBOM requirements and integrate necessary tools.
A significant majority believe AI can improve security visibility but also raise new risks.
Information security
fromTechzine Global
1 month ago

Eight vulnerabilities hit HPE StoreOnce, upgrade required

HPE StoreOnce has critical vulnerabilities, including an authentication bypass that enables further attacks.
Users need to upgrade to StoreOnce Software v4.3.11 to mitigate vulnerabilities.
fromThe Hacker News
1 month ago

Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub

A new cryptojacking campaign exploits vulnerabilities in DevOps servers to mine cryptocurrencies.
Information security
fromTechzine Global
2 months ago

Active exploitation of vulnerabilities in Ivanti EPMM

Ivanti's Endpoint Manager Mobile has critical vulnerabilities exploited in both on-premises and cloud environments, allowing remote code execution without authentication.
Privacy technologies
fromNew York Post
2 months ago

Urgent warning to iPhone users - turn off popular feature and take these steps for safety

Apple's AirPlay feature, while convenient, has significant security flaws that could leave millions of devices vulnerable to hacking.
[ Load more ]