A new #vulnerability in Styra's Open Policy Agent (CVE-2024-8260) could expose NTLM credentials to attackers.
Attackers can exploit it to relay authentication, reinforcing the need for stringent input validation across all applications.
Read: https://thehackernews.com/2024/10/security-flaw-in-styras-opa-exposes.html
Attackers can exploit it to relay authentication, reinforcing the need for stringent input validation across all applications.
Read: https://thehackernews.com/2024/10/security-flaw-in-styras-opa-exposes.html
π€―11π4π3
North Korea's Lazarus Group exploits a zero-day #vulnerability (CVE-2024-4947) in Google Chrome to target the #cryptocurrency sector.
Exploitation strategy involved social media manipulation and fake game promotions.
Learn more: https://thehackernews.com/2024/10/lazarus-group-exploits-google-chrome.html
Exploitation strategy involved social media manipulation and fake game promotions.
Learn more: https://thehackernews.com/2024/10/lazarus-group-exploits-google-chrome.html
π₯15π10π€―4
Cisco has patched CVE-2024-20481, a #vulnerability affecting its ASA and Firepower devices that could lead to a denial-of-service (DoS) for Remote Access VPNs.
Learn more: https://thehackernews.com/2024/10/cisco-issues-urgent-fix-for-asa-and-ftd.html
Learn more: https://thehackernews.com/2024/10/cisco-issues-urgent-fix-for-asa-and-ftd.html
π7π₯7π3π1
Researchers identified a #vulnerability in AWS CDK that may lead to account takeover, with over 1% of users at risk from predictable S3 bucket names.
The solution: update your CDK version and customize bucket names.
Read: https://thehackernews.com/2024/10/aws-cloud-development-kit-vulnerability.html
The solution: update your CDK version and customize bucket names.
Read: https://thehackernews.com/2024/10/aws-cloud-development-kit-vulnerability.html
π10π€5π₯4π3
Attention: CVE-2024-41992 #vulnerability in Wi-Fi Test Suite could give attackers full control over Arcadyan routers. The flaw allows for command injection, enabling full administrative access.
Find details here β https://thehackernews.com/2024/10/researchers-discover-command-injection.html
Find details here β https://thehackernews.com/2024/10/researchers-discover-command-injection.html
π€―12π10β‘3π2
High-severity CVE-2024-50550 #vulnerability in LiteSpeed Cache plugin allows unauthorized access, highlighting critical security implications for WordPress users.
Read: https://thehackernews.com/2024/10/litespeed-cache-plugin-vulnerability.html
Read: https://thehackernews.com/2024/10/litespeed-cache-plugin-vulnerability.html
β‘7π5π₯4π±4
Google warns of active exploitation of CVE-2024-43093 in Android.
This #vulnerability allows unauthorized access to critical directories, emphasizing the need for timely updates and patching processes.
https://thehackernews.com/2024/11/google-warns-of-actively-exploited-cve.html
This #vulnerability allows unauthorized access to critical directories, emphasizing the need for timely updates and patching processes.
https://thehackernews.com/2024/11/google-warns-of-actively-exploited-cve.html
π₯16π11π4β‘3π±2π€1
π¨ CISA has added a critical #vulnerability (CVE-2024-5910) in Palo Alto Networks Expedition to its Known Exploited Vulnerabilities catalog.
This flaw allows attackers to take over admin accounts, risking sensitive data.
π Read details: https://thehackernews.com/2024/11/cisa-alerts-to-active-exploitation-of.html
This flaw allows attackers to take over admin accounts, risking sensitive data.
π Read details: https://thehackernews.com/2024/11/cisa-alerts-to-active-exploitation-of.html
β‘10π€―7
Researchers have identified a #vulnerability in Citrix Virtual Apps that allows unauthenticated RCE through improper deserialization.
Read more: https://thehackernews.com/2024/11/new-flaws-in-citrix-virtual-apps-enable.html
Patches are available, but many organizations may still be exposed if not updated.
Read more: https://thehackernews.com/2024/11/new-flaws-in-citrix-virtual-apps-enable.html
Patches are available, but many organizations may still be exposed if not updated.
π₯14π1
Exploit alert: Russia-linked threat actors have actively exploited the CVE-2024-43451 #vulnerability to deploy Spark RAT, with the potential for significant damage through credential theft.
Read: https://thehackernews.com/2024/11/russian-hackers-exploit-new-ntlm-flaw.html
Read: https://thehackernews.com/2024/11/russian-hackers-exploit-new-ntlm-flaw.html
π12π₯6π3β‘2
β οΈ Researchers have identified a high-severity #vulnerability (CVE-2024-10979) in PostgreSQL, allowing unprivileged users to alter environment variables, leading to potential code execution or information leaks.
Read: https://thehackernews.com/2024/11/high-severity-flaw-in-postgresql-allows.html
Read: https://thehackernews.com/2024/11/high-severity-flaw-in-postgresql-allows.html
β‘13π₯8π5π€―4
π΄ New Threat Alert: BrazenBamboo, a well-resourced group, is exploiting an UNPATCHED zero-day #vulnerability in Fortinet's FortiClient for Windows to extract VPN credentials.
Learn more: https://thehackernews.com/2024/11/warning-deepdata-malware-exploiting.html
Learn more: https://thehackernews.com/2024/11/warning-deepdata-malware-exploiting.html
π9π€5β‘2
Google's AI-driven tool OSS-Fuzz uncovered 26 flaws across various open-source repositories, including a serious flaw (CVE-2024-9143) in OpenSSL, marking a milestone in automated #vulnerability detection.
Read the full article here β https://thehackernews.com/2024/11/googles-ai-powered-oss-fuzz-tool-finds.html
Read the full article here β https://thehackernews.com/2024/11/googles-ai-powered-oss-fuzz-tool-finds.html
π15π₯15π5π3
False positives are a headache, but a false negative? Thatβs where the real danger lies.
Imagine thinking you've fixed a #vulnerability, only for attackers to sneak in undetected. Aesopβs Boy Who Cried Wolf is still relevant today.
A false negative could cost your company everythingβfrom compromised credentials to ransomware. Are your defenses really working?
Find out why ASV tools are the cybersecurity game-changer you need. Read the full story here: https://thehackernews.com/2024/11/cyber-story-time-boy-who-cried-secure.html
Imagine thinking you've fixed a #vulnerability, only for attackers to sneak in undetected. Aesopβs Boy Who Cried Wolf is still relevant today.
A false negative could cost your company everythingβfrom compromised credentials to ransomware. Are your defenses really working?
Find out why ASV tools are the cybersecurity game-changer you need. Read the full story here: https://thehackernews.com/2024/11/cyber-story-time-boy-who-cried-secure.html
π5π₯3π€―3π2β‘1
A critical #vulnerability (CVE-2024-11680) in the ProjectSend file-sharing app is being actively exploited.
It allows attackers to execute malicious code on vulnerable servers.
Donβt wait for an attackβpatch now: https://thehackernews.com/2024/11/critical-flaw-in-projectsend-under.html
It allows attackers to execute malicious code on vulnerable servers.
Donβt wait for an attackβpatch now: https://thehackernews.com/2024/11/critical-flaw-in-projectsend-under.html
π26π±9β‘4π2π2
U.S. has unsealed charges against a Chinese hacker for exploiting a zero-day #vulnerability in 81,000 Sophos firewalls, enabling the infiltration of critical systems, the theft of sensitive data, and targeting U.S. infrastructure.
Learn more: https://thehackernews.com/2024/12/us-charges-chinese-hacker-for.html
Learn more: https://thehackernews.com/2024/12/us-charges-chinese-hacker-for.html
π43π26π€―3
π¨ Apple's TCC framework #vulnerability exposed!
A now-patched flaw (CVE-2024-44131) allowed unauthorized apps to access sensitive data like Health info, microphone, and #iCloud backupsβwithout users knowing.
Learn more: https://thehackernews.com/2024/12/researchers-uncover-symlink-exploit.html
A now-patched flaw (CVE-2024-44131) allowed unauthorized apps to access sensitive data like Health info, microphone, and #iCloud backupsβwithout users knowing.
Learn more: https://thehackernews.com/2024/12/researchers-uncover-symlink-exploit.html
π14π±10π4β‘2π₯2π€1
π‘οΈ Critical OpenWrt #vulnerability (CVE-2024-54143) discovered β With just a 12-character hash collision, attackers can replace legitimate firmware with a malicious alternative, all without authentication.
Discover the technical details: https://thehackernews.com/2024/12/critical-openwrt-vulnerability-exposes.html
Discover the technical details: https://thehackernews.com/2024/12/critical-openwrt-vulnerability-exposes.html
π€―15π12π₯7π±6π2β‘1