Microsoft Power Pages websites attacked via security holeMicrosoft patched a critical security vulnerability in Power Pages and advised users to check for signs of exploitation.
DeepSeek Database Leaking Sensitive Information Highlights AI Security RisksWiz highlights a serious database vulnerability in DeepSeek, underscoring the AI industry's need for improved security measures.
AWS CDK flaw exposed accounts to full takeoverAWS fixed a significant vulnerability in its Cloud Development Kit that could lead to account hijacking for a small percentage of users.
Microsoft Power Pages websites attacked via security holeMicrosoft patched a critical security vulnerability in Power Pages and advised users to check for signs of exploitation.
DeepSeek Database Leaking Sensitive Information Highlights AI Security RisksWiz highlights a serious database vulnerability in DeepSeek, underscoring the AI industry's need for improved security measures.
AWS CDK flaw exposed accounts to full takeoverAWS fixed a significant vulnerability in its Cloud Development Kit that could lead to account hijacking for a small percentage of users.
Exclusive: Stalkerware apps Cocospy and Spyic are exposing phone data of millions of peopleA security vulnerability in Cocospy and Spyic apps exposes personal data of millions unknowingly monitored users.Sensitive personal data can be accessed due to flaws in phone-monitoring spyware.
YouTube ID exploited to find Gmail deests, says researcherGoogle's privacy promises are compromised by vulnerabilities exposing YouTube channel email addresses.A researcher discovered flaws in Google's People API and Gaia ID system.
Exclusive: Stalkerware apps Cocospy and Spyic are exposing phone data of millions of peopleA security vulnerability in Cocospy and Spyic apps exposes personal data of millions unknowingly monitored users.Sensitive personal data can be accessed due to flaws in phone-monitoring spyware.
YouTube ID exploited to find Gmail deests, says researcherGoogle's privacy promises are compromised by vulnerabilities exposing YouTube channel email addresses.A researcher discovered flaws in Google's People API and Gaia ID system.
Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOSApple patched a vulnerability allowing unauthorized access to sensitive data by bypassing the TCC framework, potentially compromising user privacy.
Apple plugs exploited security hole in iOS, updates macOSApple has addressed a serious security flaw that was being actively exploited, urging users to update their devices promptly.
Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOSApple patched a vulnerability allowing unauthorized access to sensitive data by bypassing the TCC framework, potentially compromising user privacy.
Apple plugs exploited security hole in iOS, updates macOSApple has addressed a serious security flaw that was being actively exploited, urging users to update their devices promptly.
Meta's Llama Framework Flaw Exposes AI Systems to Remote Code Execution RisksA high-severity vulnerability in Meta's Llama framework could allow remote code execution via deserialization of untrusted data.
Facebook awards researcher $100,000 for finding bug that granted internal access | TechCrunchBen Sadeghipour discovered a critical security vulnerability in Facebook's ad platform, leading to a $100,000 bounty payment from Meta.
Meta's Llama Framework Flaw Exposes AI Systems to Remote Code Execution RisksA high-severity vulnerability in Meta's Llama framework could allow remote code execution via deserialization of untrusted data.
Facebook awards researcher $100,000 for finding bug that granted internal access | TechCrunchBen Sadeghipour discovered a critical security vulnerability in Facebook's ad platform, leading to a $100,000 bounty payment from Meta.
Patch this hole or risk Kubernetes Windows node hijackingsA recently patched command-injection vulnerability in Kubernetes could allow remote code execution on Windows endpoints within a cluster.
Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access RiskA critical vulnerability in Kubernetes Image Builder could lead to root access; it has been fixed in version 0.1.38.
Patch this hole or risk Kubernetes Windows node hijackingsA recently patched command-injection vulnerability in Kubernetes could allow remote code execution on Windows endpoints within a cluster.
Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access RiskA critical vulnerability in Kubernetes Image Builder could lead to root access; it has been fixed in version 0.1.38.
Asus lets chip fix slip out early, AMD says patch is inboundAMD confirmed a microcode-related security vulnerability affecting some of its microprocessors.The vulnerability relates to microcode signature verification, potentially allowing unauthorized code loading.
Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit InstallationA recently patched macOS security flaw allowed potential exploitation to bypass System Integrity Protection, endangering system integrity and facilitating malicious activities.
Critical Apache Struts bug under active exploitCritical security flaw in Apache Struts 2 allows file upload manipulation, posing severe risks of remote code execution; immediate updates are essential.
Doomsday 9.9 unauthenticated RCE bug affects all LinuxA critical 9.9-rated unauthenticated RCE flaw is affecting GNU/Linux systems, with no fix yet despite disclosure to developers three weeks ago.
Thousands of PAN-OS devices compromised by critical exploitsPalo Alto Networks firewalls were compromised due to two security bugs, allowing attackers to deploy backdoors and malware.
Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF InjectionGFI KerioControl firewalls have a vulnerability (CVE-2024-52875) allowing remote code execution due to improper input sanitization, posing significant security risks.
Apache MINA CVE-2024-52046: CVSS 10.0 Flaw Enables RCE via Unsafe SerializationApache MINA's CVE-2024-52046 vulnerability could lead to remote code execution, necessitating urgent updates and careful configuration to mitigate risks.
D-Link says replace vulnerable routers or risk pwnageUsers of older D-Link VPN routers should replace their devices to avoid critical security vulnerabilities.The vulnerability allows for remote code execution without authentication, raising significant security concerns.
Critical Apache Struts bug under active exploitCritical security flaw in Apache Struts 2 allows file upload manipulation, posing severe risks of remote code execution; immediate updates are essential.
Doomsday 9.9 unauthenticated RCE bug affects all LinuxA critical 9.9-rated unauthenticated RCE flaw is affecting GNU/Linux systems, with no fix yet despite disclosure to developers three weeks ago.
Thousands of PAN-OS devices compromised by critical exploitsPalo Alto Networks firewalls were compromised due to two security bugs, allowing attackers to deploy backdoors and malware.
Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF InjectionGFI KerioControl firewalls have a vulnerability (CVE-2024-52875) allowing remote code execution due to improper input sanitization, posing significant security risks.
Apache MINA CVE-2024-52046: CVSS 10.0 Flaw Enables RCE via Unsafe SerializationApache MINA's CVE-2024-52046 vulnerability could lead to remote code execution, necessitating urgent updates and careful configuration to mitigate risks.
D-Link says replace vulnerable routers or risk pwnageUsers of older D-Link VPN routers should replace their devices to avoid critical security vulnerabilities.The vulnerability allows for remote code execution without authentication, raising significant security concerns.
Volkswagen leak exposed location data for 800,000 electric carsVolkswagen experienced a significant data leak exposing the location and personal information of approximately 800,000 electric vehicle owners.
Location and privacy of Volkswagen electric car owners exposed due to database 'misconfiguration'A software glitch left 800,000 Volkswagen electric car owners in Europe vulnerable to fraud risks due to unprotected GPS and personal data.
Volkswagen leak exposed location data for 800,000 electric carsVolkswagen experienced a significant data leak exposing the location and personal information of approximately 800,000 electric vehicle owners.
Location and privacy of Volkswagen electric car owners exposed due to database 'misconfiguration'A software glitch left 800,000 Volkswagen electric car owners in Europe vulnerable to fraud risks due to unprotected GPS and personal data.
Data broker leaves 600K+ sensitive files exposed onlineOver 600,000 sensitive files, including personal data, were exposed in a non-password protected database belonging to SL Data Services.
Ransomware gangs are loving this dumb but deadly ESXi flawThe CVE-2024-37085 vulnerability allows attackers to gain full control of an ESXi hypervisor by creating specific AD groups, potentially leading to serious security breaches.
Tracker firm Hapn spilling names of thousands of GPS tracking customers | TechCrunchHapn exposed thousands of customer names due to a website bug, raising significant privacy concerns for users and impacting corporate clients.The database leak included sensitive details of 8,600 GPS trackers, jeopardizing customer and corporate security.
Data broker leaves 600K+ sensitive files exposed onlineOver 600,000 sensitive files, including personal data, were exposed in a non-password protected database belonging to SL Data Services.
Ransomware gangs are loving this dumb but deadly ESXi flawThe CVE-2024-37085 vulnerability allows attackers to gain full control of an ESXi hypervisor by creating specific AD groups, potentially leading to serious security breaches.
Tracker firm Hapn spilling names of thousands of GPS tracking customers | TechCrunchHapn exposed thousands of customer names due to a website bug, raising significant privacy concerns for users and impacting corporate clients.The database leak included sensitive details of 8,600 GPS trackers, jeopardizing customer and corporate security.
Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware InjectionA critical vulnerability in OpenWrt allows malicious firmware distribution through an unchecked build request process.
Critical WordPress plugin vulnerability under active exploit threatens thousandsThousands of WordPress sites are unpatched against a critical vulnerability in the Hunk Companion plugin, exposing them to serious security risks.
WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Malicious PluginsA critical vulnerability in the Hunk Companion WordPress plugin allows attackers to install malicious plugins, which can lead to severe security breaches.
WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million SitesJetpack plugin fixed a critical vulnerability that could expose user-submitted forms to logged-in users.Over 101 versions of the Jetpack plugin were updated due to this security flaw.
LiteSpeed Cache Plugin Vulnerability Poses Significant Risk to WordPress WebsitesA high-severity security vulnerability in LiteSpeed Cache allows unauthenticated users to gain admin access, potentially jeopardizing WordPress sites.
Critical WordPress plugin vulnerability under active exploit threatens thousandsThousands of WordPress sites are unpatched against a critical vulnerability in the Hunk Companion plugin, exposing them to serious security risks.
WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Malicious PluginsA critical vulnerability in the Hunk Companion WordPress plugin allows attackers to install malicious plugins, which can lead to severe security breaches.
WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million SitesJetpack plugin fixed a critical vulnerability that could expose user-submitted forms to logged-in users.Over 101 versions of the Jetpack plugin were updated due to this security flaw.
LiteSpeed Cache Plugin Vulnerability Poses Significant Risk to WordPress WebsitesA high-severity security vulnerability in LiteSpeed Cache allows unauthenticated users to gain admin access, potentially jeopardizing WordPress sites.
AWS Cloud Development Kit Vulnerability Enables Full AWS Account TakeoverA newly discovered vulnerability in AWS CDK could allow attackers to take over AWS accounts due to predictable S3 bucket names.
Canada Prepares for Immigration Surge After Trump Vows Mass DeportationThe U.S.-Canada border may become a significant migration flashpoint due to Trump's deportation policies.
Nvidia urges people to update GPU drivers due to "high" security risksNvidia advises immediate driver updates to address a high-risk vulnerability in its graphics cards.
An Okta login bug bypassed checking passwords on some long usernamesA vulnerability in AD/LDAP DelAuth allows username-based authentication exploiting cached keys under certain conditions.
Security Flaw in Styra's OPA Exposes NTLM Hashes to Remote AttackersA security vulnerability in Styra's Open Policy Agent could leak NTLM hashes, allowing for credential theft and exploitation.The flaw is linked to improper input validation leading to unauthorized access.
New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhereRADIUS, a crucial network protocol, is newly vulnerable, risking control breaches across various critical infrastructure networks.
An Okta login bug bypassed checking passwords on some long usernamesA vulnerability in AD/LDAP DelAuth allows username-based authentication exploiting cached keys under certain conditions.
Security Flaw in Styra's OPA Exposes NTLM Hashes to Remote AttackersA security vulnerability in Styra's Open Policy Agent could leak NTLM hashes, allowing for credential theft and exploitation.The flaw is linked to improper input validation leading to unauthorized access.
New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhereRADIUS, a crucial network protocol, is newly vulnerable, risking control breaches across various critical infrastructure networks.
ChatGPT macOS Flaw Could've Enabled Long-Term Spyware via Memory FunctionA security flaw in ChatGPT's macOS app could allow persistent spyware to exfiltrate user data through its memory feature.
Microsoft patches rollback flaw in Windows 10A critical flaw in Windows Update allows attackers to rollback security patches, potentially exposing systems to known vulnerabilities. The flaw affects certain Windows 10 versions.
Researchers say a bug let them add fake pilots to rosters used for TSA checksSecurity vulnerability discovered in TSA's login systems could let unauthorized individuals access flight crew records.SQL injection tested by researchers confirmed serious flaws in the system allowing administrative access without proper authentication.
YubiKeys have an unfixable security flawYubiKey devices have a vulnerability that allows cloning, discovered in the Infineon cryptographic library, affecting many models and with moderate exploit difficulty.
A new critical MOVEit vulnerability is being exploited by hackers - here's what you need to knowEnterprises using MOVEit Transfer affected versions should immediately patch the critical vulnerability CVE-2024-5806 to prevent unauthorized access.
Google releases Pixel update to get rid of surveillance vulnerabilityGoogle acted promptly to remove a potentially vulnerable software from Pixel smartphones to prevent hacking risks.No evidence of exploitation was found, but concerns led to proactive security measures.
The Arc browser that lets you customize websites had a serious vulnerabilityArc browser's 'Boosts' feature allows for website customization but poses security risks due to a vulnerability that can be exploited by attackers.
Microsoft patches rollback flaw in Windows 10A critical flaw in Windows Update allows attackers to rollback security patches, potentially exposing systems to known vulnerabilities. The flaw affects certain Windows 10 versions.
Researchers say a bug let them add fake pilots to rosters used for TSA checksSecurity vulnerability discovered in TSA's login systems could let unauthorized individuals access flight crew records.SQL injection tested by researchers confirmed serious flaws in the system allowing administrative access without proper authentication.
YubiKeys have an unfixable security flawYubiKey devices have a vulnerability that allows cloning, discovered in the Infineon cryptographic library, affecting many models and with moderate exploit difficulty.
A new critical MOVEit vulnerability is being exploited by hackers - here's what you need to knowEnterprises using MOVEit Transfer affected versions should immediately patch the critical vulnerability CVE-2024-5806 to prevent unauthorized access.
Google releases Pixel update to get rid of surveillance vulnerabilityGoogle acted promptly to remove a potentially vulnerable software from Pixel smartphones to prevent hacking risks.No evidence of exploitation was found, but concerns led to proactive security measures.
The Arc browser that lets you customize websites had a serious vulnerabilityArc browser's 'Boosts' feature allows for website customization but poses security risks due to a vulnerability that can be exploited by attackers.
Google Cloud Document AI flaw (still) allows data theftThe Google Cloud Document AI service has a serious vulnerability that remains unaddressed, enabling potential data theft from Cloud Storage.
1Password vulnerability lets attackers steal Vault itemsMac users with versions before 8.10.36 of 1Password are vulnerable to a bug allowing theft of vault items.
Google Cloud Document AI flaw (still) allows data theftThe Google Cloud Document AI service has a serious vulnerability that remains unaddressed, enabling potential data theft from Cloud Storage.
1Password vulnerability lets attackers steal Vault itemsMac users with versions before 8.10.36 of 1Password are vulnerable to a bug allowing theft of vault items.
Security Release for issues #13505 and #13506Trytond allows report execution on restricted records, posing a security risk that requires users to upgrade immediately.
Security Release for issue #13142Trytond is vulnerable to zip bomb attacks due to the acceptance of compressed content from unauthenticated requests.
Security Release for issues #13505 and #13506Trytond allows report execution on restricted records, posing a security risk that requires users to upgrade immediately.
Security Release for issue #13142Trytond is vulnerable to zip bomb attacks due to the acceptance of compressed content from unauthenticated requests.
YubiKeys Are a Security Gold Standard-but They Can Be ClonedYubiKey 5 has a vulnerability that allows cloning if an attacker has temporary physical access.
YubiKey vulnerability will let attackers clone the authentication deviceNinjaLab has revealed a vulnerability in YubiKey 5 Series that enables cloning of the devices, posing risks mainly to sensitive users.
YubiKeys Are a Security Gold Standard-but They Can Be ClonedYubiKey 5 has a vulnerability that allows cloning if an attacker has temporary physical access.
YubiKey vulnerability will let attackers clone the authentication deviceNinjaLab has revealed a vulnerability in YubiKey 5 Series that enables cloning of the devices, posing risks mainly to sensitive users.
SolarWinds left hardcoded credentials in helpdesk productSolarWinds' Web Help Desk had a critical security flaw due to hardcoded credentials, necessitating an immediate update for users.
Microsoft Edge users report serious issues following recent updateMicrosoft Edge update caused major usability issues for users.Fix for the bug includes disabling 'Enhance your security on the web.'
SolarWinds left hardcoded credentials in helpdesk productSolarWinds' Web Help Desk had a critical security flaw due to hardcoded credentials, necessitating an immediate update for users.
Microsoft Edge users report serious issues following recent updateMicrosoft Edge update caused major usability issues for users.Fix for the bug includes disabling 'Enhance your security on the web.'
Researchers discover potentially catastrophic exploit present in AMD chips for decadesAMD processors have a critical firmware flaw allowing deep memory infection for decades.
AMD won't patch Sinkclose security bug on older Zen CPUsSome AMD processors dating back to 2006 have a security vulnerability tracked as CVE-2023-31315, impacting models since 2020 with highly privileged execution environment issues.
Researchers discover potentially catastrophic exploit present in AMD chips for decadesAMD processors have a critical firmware flaw allowing deep memory infection for decades.
AMD won't patch Sinkclose security bug on older Zen CPUsSome AMD processors dating back to 2006 have a security vulnerability tracked as CVE-2023-31315, impacting models since 2020 with highly privileged execution environment issues.
GhostWrite Vulnerability in C910 and C920 RISC-V CPUsVulnerability 'GhostWrite' in T-Head RISC-V CPUs exposes memory contents, mitigated by kernel updates.
Researchers Reveal ConfusedFunction Vulnerability in Google Cloud PlatformA vulnerability named ConfusedFunction allows attackers to escalate privileges in Google Cloud Functions and access unauthorized data.Google has updated Cloud Build to prevent misuse post-responsible disclosure.
Crooks plant backdoor in software used by courtrooms around the worldA software update for JAVS Viewer 8 contained a hidden backdoor, putting over 10,000 courtrooms at risk of unauthorized access by threat actors.
Hackers make millions of attempts to exploit WordPress plugin vulnerabilityHackers are exploiting a severe vulnerability in the WordPress Automatic plugin, allowing complete website takeover.
Someone is hacking 3D printers to warn owners of a security flawAnycubic Kobra 2 Pro/Plus/Max 3D printer faces security vulnerability with warning message advising to disconnect from the internet.A hacker targeting vulnerable printers sent warning messages regarding a critical vulnerability through ASCII art.
Vendors' response to my LLM-crasher bug report was direReporting bugs with a story in reputable publications can yield substantial responses. Caution is crucial when handling potentially dangerous information.
'Almost every Apple device' vulnerable to CocoaPodsCocoaPods faced a security issue with thousands of unclaimed packages, potentially leading to supply chain attacks on iOS and macOS apps.
Zero Day Initiative - Getting Unauthenticated Remote Code Execution on the Logsign Unified SecOps PlatformA lack of rate limiting in password reset requests poses a security vulnerability on web servers, enabling potential brute-force attacks on admin passwords.
'Unusually scary' bug in Apple Vision Pro allows hackers to fill your room with spiders, batsA software bug in Apple Vision Pro headset allowed hackers to flood users' virtual reality with spiders and bats, exploiting Safari to trigger the security gap.
Phoenix UEFI bug affects long list of Intel chip familiesA new vulnerability (CVE-2024-0762) affecting UEFI firmware in Intel chip families similar to BlackLotus poses security threats.
Update your Windows PC to avoid a serious Wi-Fi vulnerabilityInstall Microsoft's latest update to patch a critical vulnerability in Windows 11 and 10 related to public Wi-Fi networks.