In December 2025, vulnerabilities in SolarWinds Web Help Desk instances were exploited, allowing attackers to gain initial access to compromised systems. This incident raises concerns for organizations using SolarWinds products, as it indicates that these flaws may have been leveraged as zero-day exploits. Such vulnerabilities can lead to unauthorized access and potential data breaches, making it crucial for affected companies to address these security gaps promptly. Users should be vigilant and monitor their systems for unusual activity while applying any available patches or updates. The incident serves as a reminder of the ongoing risks associated with third-party software vulnerabilities.
Articles tagged "Vulnerability"
Found 514 articles
Huntress has reported an ongoing attack exploiting vulnerabilities in SolarWinds Web Help Desk software. Attackers are targeting unpatched versions of this tool to execute remote code, which allows them to install Zoho ManageEngine software for persistent access and Velociraptor for control over compromised systems. This incident was confirmed on February 7, 2026, and it raises significant concerns for organizations that rely on SolarWinds products, as it highlights the risks associated with unaddressed software vulnerabilities. Companies using this software should prioritize patching to safeguard against these exploits and prevent unauthorized access to their systems.
SmarterTools has reported a ransomware attack that compromised a data center used for quality control testing. The breach occurred due to a vulnerability in one of SmarterTools' own products, which allowed hackers to infiltrate their systems. As a result, customers have been affected, although specific details on the extent of the impact have not been disclosed. This incident raises concerns about the security of software products, especially those used in business environments. Companies using SmarterTools' services should review their security measures and remain vigilant for any unusual activity.
Help Net Security
CVE-2026-1731BeyondTrust has addressed a serious remote code execution vulnerability, identified as CVE-2026-1731, which affects its Remote Support (RS) and Privileged Remote Access (PRA) solutions. This vulnerability can be exploited without authentication, making it particularly dangerous for self-hosted customers. BeyondTrust is urging users to apply the patch immediately to protect their systems. Unlike a previous zero-day vulnerability exploited by threat actors linked to China, this issue was discovered by a security researcher and disclosed privately. The prompt action by BeyondTrust highlights the necessity for timely vulnerability management in remote access tools, which are critical for many organizations.
SCM feed for Latest
Recent reports indicate that nearly 7.1% of skills associated with the open-source AI agent OpenClaw on the ClawHub marketplace may be exposing sensitive information such as API keys, credentials, and credit card details. This vulnerability arises from issues in the SKILL.md instructions, which guide developers on how to create and use these skills. The exposure of such critical data can lead to unauthorized access and financial fraud, impacting both developers and users who rely on these AI capabilities. It's crucial for developers to review their implementations and ensure they are safeguarding sensitive information to prevent potential exploitation. This incident serves as a reminder of the importance of secure coding practices in open-source projects.
BleepingComputer
The Cybersecurity & Infrastructure Security Agency (CISA) has issued a warning regarding a serious vulnerability, identified as CVE-2026-24423, in SmarterMail. This flaw allows for unauthenticated remote code execution (RCE), which means attackers could potentially take control of affected systems without needing any prior authentication. This vulnerability has already been leveraged in ransomware attacks, posing significant risks to users and organizations running SmarterMail. Users are urged to take immediate action to secure their systems, as the flaw could lead to severe data breaches and operational disruptions. The urgency of this warning stems from the active exploitation of the flaw in the wild, highlighting the need for prompt remediation.
SCM feed for Latest
In 2025, Proton's Data Breach Observatory reported a staggering 794 major data breaches that collectively exposed over 306 million records. These incidents primarily targeted small businesses, highlighting a significant vulnerability within this sector. The breaches varied in nature, but they all led to sensitive information being compromised, which can have dire consequences for both the businesses involved and their customers. The data exposed in these breaches could include personal information, financial details, and other confidential records, raising concerns about identity theft and fraud. This situation underscores the urgent need for small businesses to bolster their cybersecurity measures to protect against such attacks.
The House panel has approved five bills aimed at strengthening cybersecurity defenses in the energy sector. This decision follows the Department of Energy's recent Liberty Eclipse cybersecurity exercise, which evaluated the sector's readiness against cyber threats. These legislative measures are designed to enhance the security infrastructure of energy companies, which are increasingly targeted by cyberattacks. The move underscores the government's recognition of the energy sector's vulnerability and the need for improved protective measures to safeguard critical infrastructure. This legislative push is significant as it reflects ongoing concerns about the potential impact of cyber incidents on energy supplies and national security.
A significant vulnerability has been found in SmarterMail, a popular email server software, which allows attackers to execute arbitrary code remotely without needing authentication. This flaw has already been exploited in ransomware attacks, raising concerns for organizations that rely on this software. Attackers can send specially crafted HTTP requests to take control of affected systems, potentially leading to data breaches and operational disruptions. Users and administrators of SmarterMail are urged to take immediate action to protect their systems. The situation is critical as the vulnerability is currently being exploited in the wild, making prompt remediation essential.
The Cybersecurity and Infrastructure Security Agency (CISA) has updated 59 entries in its Known Exploited Vulnerabilities (KEV) catalog to indicate that these vulnerabilities are being actively exploited in ransomware attacks. This update raises concerns among security experts because it implies that organizations may be unaware that their systems are vulnerable to these specific attacks. The vulnerabilities affect a range of products, and the updates were made without much public awareness, which could leave many companies at risk. It's crucial for organizations to review these updates and apply necessary patches to protect against potential ransomware threats. This situation stresses the need for better communication regarding vulnerability management in the cybersecurity community.
SCM feed for Latest
n8n, an open-source automation platform, is facing serious security issues due to two critical vulnerabilities that allow attackers to escape the platform's sandbox. These flaws could potentially give attackers complete control over the server and lead to the compromise of user credentials. Users of n8n should be particularly concerned as these vulnerabilities pose a high risk of server takeover. The discovery of these issues raises alarms for organizations relying on n8n for AI orchestration, highlighting the need for immediate action to secure their systems. It's crucial for affected users to stay informed and apply any necessary updates to mitigate risks.
SCM feed for Latest
Recent findings have revealed that configuration files in Visual Studio Code (VS Code) can be exploited to launch remote code execution (RCE) attacks through GitHub Codespaces. This situation poses significant risks, including supply chain issues, credential theft, and unauthorized network access. Researchers warn that attackers could manipulate these config files to gain control over users' development environments, potentially affecting developers and companies relying on this popular platform. The implications are serious, as sensitive data and infrastructure could be compromised if these vulnerabilities are not addressed promptly. It is crucial for users to stay vigilant and adopt best practices to secure their coding environments.
In a recent examination of the new AirTag 2, a notable security vulnerability was discovered. An individual was able to disable the device's speaker in just two minutes using a single tool. This is significant because the speaker is essential for alerting users to the AirTag's location, which could lead to unauthorized tracking or tampering. If an attacker can easily silence the AirTag, it undermines its primary function of helping users locate lost items. This flaw raises concerns for anyone who relies on the AirTag for tracking personal belongings, as it may create opportunities for misuse. Apple's tracking devices are popular among consumers, and this discovery could lead to increased scrutiny of their security features.
BleepingComputer
CISA has reported that ransomware gangs are now exploiting a serious vulnerability in VMware ESXi, which allows attackers to escape sandboxes and gain unauthorized access to systems. This vulnerability, which had previously been used in zero-day attacks, poses a significant risk to organizations using affected VMware products. Companies relying on VMware ESXi for virtualization need to be particularly vigilant, as attackers are actively targeting this flaw. The exploitation of such vulnerabilities can lead to severe data breaches and financial losses. Organizations should prioritize patching their systems to mitigate this risk and protect sensitive data from potential ransomware attacks.
BleepingComputer
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding a five-year-old vulnerability in GitLab that is currently being exploited in cyberattacks. This flaw affects various versions of GitLab, and its exploitation puts government agencies and organizations using this software at risk. CISA is urging all agencies to apply the necessary patches to safeguard their systems against potential attacks. This situation emphasizes the importance of keeping software up to date, especially for widely used platforms like GitLab. Failure to address such vulnerabilities can lead to serious security breaches, impacting sensitive data and operations.