The UK Companies House has acknowledged a security vulnerability that potentially exposed sensitive details of millions of businesses. This flaw could allow unauthorized individuals to access company information and modify official records. The agency has confirmed that the issue could have serious implications for the integrity of business data in the UK, raising concerns about identity theft and fraud. As Companies House holds critical information about registered companies, this exposure poses a significant risk to both businesses and consumers. Authorities are urging companies to remain vigilant and review their security practices in light of this breach.
Articles tagged "Vulnerability"
Found 497 articles
Infosecurity Magazine
Researchers have identified a security vulnerability called 'CursorJack' that affects the Cursor IDE, a development environment used for coding, particularly in AI projects. This flaw allows attackers to exploit malicious deeplinks, which can lead to unauthorized code execution if users inadvertently approve these links. The risk is significant because it can compromise the integrity of the code being developed, potentially leading to the introduction of harmful code into applications. Developers using the Cursor IDE should be aware of this vulnerability and take precautions to avoid falling victim to such attacks. The implications extend beyond individual users, as compromised code could lead to broader security issues in applications that rely on this development environment.
BleepingComputer
Researchers have identified a new font-rendering attack that can trick AI tools into overlooking malicious commands embedded in seemingly harmless HTML on webpages. This technique manipulates how text is displayed, making it difficult for AI assistants to recognize and respond to the hidden threats. The attack poses a significant risk, as it can be used to bypass security measures and deliver harmful instructions without triggering alerts. Users and organizations relying on AI for automated tasks or security monitoring need to be aware of this vulnerability, as it could lead to unauthorized actions or data breaches. The discovery emphasizes the need for enhanced scrutiny of web content, especially as AI tools become more integrated into everyday applications.
BleepingComputer
The Cybersecurity and Infrastructure Security Agency (CISA) has alerted U.S. government agencies about a vulnerability in Wing FTP Server that is currently being exploited in attacks. This flaw could potentially allow attackers to execute remote code, raising the risk of severe security breaches. Organizations using this software need to take immediate action to secure their systems, as the vulnerability could be linked to more extensive exploitation tactics. The warning is particularly urgent for agencies that manage sensitive data, as the consequences of an attack could be significant. It's crucial for affected users to stay vigilant and apply any available security measures to mitigate risks.
Hackread – Cybersecurity News, Data Breaches, AI and More
Companies House, the UK's official register of companies, recently addressed a significant flaw in its WebFiling service. This vulnerability allowed unauthorized users to not only view sensitive director details but also modify company records. The issue prompted Companies House to take the service offline temporarily while they worked on a fix. After resolving the flaw, the WebFiling service was restored, but the incident raises concerns about the security of sensitive corporate information. Users and companies relying on this service need to be aware of the potential risks associated with such vulnerabilities.
Infosecurity Magazine
Recent vulnerabilities in CrackArmor's AppArmor have been discovered, allowing local users of Linux systems to escalate their privileges to root access. This flaw not only compromises the host system but also allows attackers to break out of container environments and launch denial-of-service (DoS) attacks. The implications are significant for any organization relying on Linux, as it increases the risk of unauthorized access and system disruption. Users should be particularly vigilant if they are running systems with AppArmor enabled, as these vulnerabilities could lead to severe security incidents if exploited. Immediate action is advised to mitigate potential risks associated with these flaws.
Infosecurity Magazine
A recent security flaw in the AWS Bedrock Code Interpreter has raised concerns among cloud users. This vulnerability involves a DNS-based attack that allows AI sandboxes to exfiltrate sensitive data from cloud environments. The issue affects AWS Bedrock's AgentCore, which is crucial for running AI applications in a secure environment. Companies using AWS Bedrock services need to be aware of this vulnerability as it could potentially expose their data to unauthorized access. This incident underscores the need for enhanced security measures in cloud-based AI applications.
Hackread – Cybersecurity News, Data Breaches, AI and More
Security researchers at Qualys have identified a vulnerability known as 'CrackArmor' in AppArmor, a security tool used to restrict the capabilities of applications on Linux systems. This flaw affects approximately 12.6 million Linux systems, potentially allowing attackers to gain root access and escape from containers. Such a breach can lead to unauthorized control over affected systems, posing significant risks to data integrity and system security. Users of Linux systems, especially those employing AppArmor for security, should take this issue seriously and stay informed about potential exploits. The discovery underscores the need for regular system updates and vigilance against emerging vulnerabilities.
Hackread – Cybersecurity News, Data Breaches, AI and More
A serious SQL injection vulnerability has been discovered in the Ally WordPress plugin, putting over 200,000 websites at risk of data theft. This flaw allows attackers to manipulate database queries, potentially exposing sensitive user information. Although a patch has been released to fix the issue, many installations remain unpatched and therefore vulnerable. Website owners are urged to apply the update as soon as possible to protect their sites and users. The ongoing risk highlights the importance of timely software updates in safeguarding against cyber threats.
SCM feed for Latest
A recent security vulnerability has been identified in several widely-used software applications, affecting users and businesses alike. This vulnerability allows attackers to gain unauthorized access to sensitive data, putting personal and organizational information at risk. The affected products include popular content management systems and cloud services, which are used by millions of individuals and enterprises. Experts urge users to update their software immediately to protect against potential exploitation. Failure to address this issue could lead to significant data breaches and financial loss for affected parties.
Veeam Software has issued patches for serious vulnerabilities in its Backup & Replication solution, including four critical remote code execution (RCE) flaws. These vulnerabilities could allow attackers to execute malicious code on affected backup servers, potentially leading to data breaches or system takeovers. Organizations using Veeam's software should prioritize applying these patches to safeguard their systems. The risks are particularly concerning for companies that rely on Veeam for data protection, as failing to address these vulnerabilities could leave sensitive data exposed. This incident serves as a reminder for all users of backup solutions to stay vigilant and ensure their software is up to date.
BleepingComputer
In 2025, Google awarded over $17 million to 747 security researchers through its Vulnerability Reward Program (VRP) for reporting various security vulnerabilities. This initiative not only incentivizes researchers to identify and report bugs but also strengthens the overall security of Google's products and services. By paying for these reports, Google is actively encouraging contributions from the security community, which helps mitigate potential threats before they can be exploited. This program is essential for maintaining user trust and safeguarding sensitive information across the company's platforms. The financial commitment reflects the increasing importance of cybersecurity in the tech industry.
A serious SQL injection vulnerability (CVE-2026-2413) has been discovered in the Ally plugin for WordPress, which is currently used on over 400,000 websites. This flaw allows attackers to exploit the plugin without needing any authentication, potentially enabling them to access and steal sensitive data from affected sites. The vulnerability has a CVSS score of 7.5, indicating a high severity level. Security researchers at Acquia, including Drew Webber, identified this issue, raising concerns for site administrators who may not be aware of the risks. It's crucial for users of the Ally plugin to take immediate action to protect their sites from potential attacks.
This week's security bulletin covers several emerging threats that could impact users and organizations. A new OAuth vulnerability has been identified, which could allow attackers to hijack user sessions without their knowledge. Additionally, researchers have discovered a new phishing scheme targeting Signal users, which exploits the app's encryption features to trick individuals into revealing sensitive information. Another threat involves a technique dubbed 'Zombie ZIP,' where attackers use ZIP files to bypass security measures. Finally, an AI platform has been hacked, raising concerns about the security of machine learning systems. These incidents underline the need for vigilance and updated security practices to protect against evolving attack methods.
A vulnerability in the Ally WordPress plugin has exposed over 200,000 websites to potential attacks. This flaw allows attackers to inject SQL queries, which can lead to unauthorized access and extraction of sensitive information from the website's database. The vulnerability is particularly concerning for site owners who rely on the plugin for various functionalities. Users are urged to take immediate action to secure their sites to prevent possible data breaches. Website administrators should monitor their systems closely and apply any available patches as soon as possible to mitigate the risk.