#vulnerabilities

[ follow ]
#cybersecurity
Information security
fromThe Hacker News
5 days ago

6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits

Axis Communications video surveillance products have multiple security flaws that could lead to takeover attacks if exploited.
fromArs Technica
3 days ago

Encryption made for police and military radios may be easily cracked

At least one implementation of the end-to-end encryption solution endorsed by ETSI has a similar issue that makes it equally vulnerable to eavesdropping.
Privacy technologies
Artificial intelligence
fromNextgov.com
3 days ago

DARPA unveils winners of AI challenge to boost critical infrastructure cybersecurity

AI Cyber Challenge announced winners focusing on AI models for identifying and patching vulnerabilities in critical infrastructure code.
Apple
fromstupidDOPE | Est. 2008
4 days ago

Update Your iPhone Now: iOS 18.6 Patches 29 Serious Security Flaws | stupidDOPE | Est. 2008

iOS 18.6 is crucial for iPhone security, fixing 29 vulnerabilities, particularly in Safari and WebKit.
fromTheregister
5 days ago

CISA releases malware analysis for Sharepoint Server attack

CISA analysed six files including two Dynamic Link-Library (.DLL), one cryptographic key stealer, and three web shells. Cyber threat actors could leverage this malware to steal cryptographic keys and execute a Base64-encoded PowerShell command to fingerprint host system and exfiltrate data.
Privacy professionals
fromZDNET
6 days ago

Claude Code makes it easy to trigger a code check now with this simple command

Automated security reviews in Claude Code help ensure code safety.
fromTheregister
1 week ago

Nvidia patches bug chain leading to total Triton takeover

The first vulnerability (CVE-2025-23320 - 7.5) relates to a bug in the Python backend, triggered by exceeding the shared memory limit, using a very large request.
Information security
#ai
fromDevOps.com
1 week ago
Artificial intelligence

Cycode Delivers AI Agent to Assess How Exploitable Vulnerabilities Are - DevOps.com

fromDevOps.com
1 week ago
Artificial intelligence

Cycode Delivers AI Agent to Assess How Exploitable Vulnerabilities Are - DevOps.com

#ai-security
fromInfoQ
1 week ago
Privacy technologies

"A Security Nightmare": Docker Warns of Risks in MCP Toolchains

fromInfoQ
1 week ago
Privacy technologies

"A Security Nightmare": Docker Warns of Risks in MCP Toolchains

fromTheregister
2 weeks ago

Blame a leak for Microsoft SharePoint attacks: researcher

A leak happened here somewhere,” Dustin Childs, head of threat awareness at Trend Micro's Zero Day Initiative (ZDI), told The Register. “And now you’ve got a zero-day exploit in the wild, and worse than that, you’ve got a zero-day exploit in the wild that bypasses the patch, which came out the next day.
Privacy professionals
#sharepoint
#microsoft
fromZDNET
2 weeks ago
Information security

Microsoft fixes two SharePoint zero-days under attack, but one is still unresolved - how to patch

fromZDNET
2 weeks ago
Information security

Microsoft fixes two SharePoint zero-days under attack, but one is still unresolved - how to patch

fromForbes
3 weeks ago

Security Debt Is The New Tech Debt-And It's Already Compounding

Accumulation of unaddressed vulnerabilities and misconfigurations leads to security debt, which poses significant risks to organizations.
#cisco
fromSecuritymagazine
3 weeks ago

Proximity Cards Are a Liability: The Urgent Beed to Modernize Access Control

Data compromises have reached over 1.3 billion individuals in 2024, with vulnerabilities primarily linked to initial access.
fromTechzine Global
3 weeks ago

Chinese cyber espionage groups target strategic sectors

In the first half of 2025, it was observed that groups affiliated with China targeted key sectors like telecommunications and semiconductors through advanced cyber espionage activities.
Privacy professionals
fromTechzine Global
4 weeks ago

An average of 131 CVE reports per day

The number of CVE reports is projected to exceed 40,000 in 2025, with an average of 131 reports per day observed in early 2025.
Information security
#software-security
fromIT Pro
2 months ago
Software development

Shifting left might improve software security, but developers are becoming overwhelmed - communication barriers, tool sprawl, and 'vulnerability overload' is causing serious headaches for development teams

fromIT Pro
2 months ago
Software development

Shifting left might improve software security, but developers are becoming overwhelmed - communication barriers, tool sprawl, and 'vulnerability overload' is causing serious headaches for development teams

fromSecuritymagazine
1 month ago

Sudo Vulnerability Discovered, May Exposes Linux Systems

CVE-2025-32462 has received a lower CVSS score due to the conditions that are needed. Namely, successful execution would require someone to make a misconfiguration and deploy a Sudoers file with an incorrect host for this vulnerability to work.
Privacy professionals
fromArs Technica
1 month ago

Critical CitrixBleed 2 vulnerability has been under active exploit for weeks

Cybersecurity researchers revealed that a critical vulnerability, CVE-2025-5777, in Citrix network management devices has been exploited for over a month, contradicting Citrix's claims.
Privacy professionals
fromForbes
4 months ago

Hackers Bypass Windows Defender Security - What You Need To Know

Bobby Cooke from IBM X-Force Red confirmed that the Microsoft Teams application was 'a viable WDAC bypass,' demonstrating significant security vulnerabilities in Windows Defender.
Information security
Online Community Development
fromIT Pro
1 month ago

MCP servers used by developers and 'vibe coders' are riddled with vulnerabilities - here's what you need to know

MCP servers are highly vulnerable due to their misconfiguration, risking sensitive assets and enabling unauthorized remote access.
The prevalence of vulnerabilities such as 'NeighborJack' highlights the need for better security measures in MCP server deployments.
fromIndependent
1 month ago

David W Higgins: No, we're not on the cusp of WWIII, but that doesn't mean I'd rule out the possibility of ration cards

Investing in vulnerabilities is wiser than boosting defense spending.
Nuclear weapons development resembles a plot from a spy thriller.
Two nuclear detonations in history highlight the grave risks.
fromTheregister
1 month ago

Former US Army Sergeant admits he sold secrets to China

A former US Army sergeant pled guilty to trying to sell classified data to China after exploiting his top-secret clearance.
fromThe Hacker News
2 months ago

Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

Cybersecurity researchers discovered over 20 misconfigurations in Salesforce Industry Cloud, putting sensitive data at risk of exposure to unauthorized access.
Information security
Information security
fromArs Technica
2 months ago

Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them.

Microsoft patched a critical Secure Boot vulnerability that enables malware installation before OS loading, affecting over 50 device manufacturers.
fromZero Day Initiative
2 months ago

Zero Day Initiative - The June 2025 Security Update Review

Adobe's June 2025 updates address 254 CVEs across multiple products, prioritizing those in Commerce and introducing a substantial fix for Experience Manager, despite no known exploits.
Web frameworks
Information security
fromDevOps.com
2 months ago

Survey Surfaces Uneven Adoption of SBOMs to Secure Software - DevOps.com

Many organizations are struggling to meet SBOM requirements and integrate necessary tools.
A significant majority believe AI can improve security visibility but also raise new risks.
Information security
fromTechzine Global
2 months ago

Eight vulnerabilities hit HPE StoreOnce, upgrade required

HPE StoreOnce has critical vulnerabilities, including an authentication bypass that enables further attacks.
Users need to upgrade to StoreOnce Software v4.3.11 to mitigate vulnerabilities.
fromThe Hacker News
2 months ago

Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub

A new cryptojacking campaign exploits vulnerabilities in DevOps servers to mine cryptocurrencies.
[ Load more ]