Articles tagged "Vulnerability"

Found 515 articles

According to Government Technology, the number of recorded data breaches soared to 3,322 last year, marking the highest level ever documented. Alarmingly, about 70% of the breach notices lacked essential details about the incidents, leaving users and stakeholders in the dark about the nature of the breaches and the extent of the data compromised. This lack of transparency is concerning, as it prevents affected individuals from understanding their risks and taking necessary precautions. The surge in breaches indicates a growing vulnerability landscape, which raises questions about the effectiveness of current security measures across various sectors. As organizations continue to face increasing cyber threats, the need for clearer communication and accountability in breach disclosures becomes ever more critical.

Impact: N/A
Remediation: N/A
Read Original

A recent analysis has uncovered that approximately 175,000 hosts running Ollama, a platform for large language models (LLMs), are exposed to potential abuse. Among these, 23,000 hosts were found to be particularly active over a span of nearly a year, raising concerns about their security. This large number of exposed hosts could allow malicious actors to exploit LLMs for harmful purposes, such as generating misleading information or automating cyberattacks. The implications of this vulnerability are significant, as it puts both users and organizations at risk of being targeted by attackers leveraging these exposed systems. Experts urge immediate action to secure these hosts to prevent misuse.

Impact: Ollama hosts
Remediation: Organizations should secure their Ollama hosts and ensure proper configuration to prevent unauthorized access.
Read Original

SmarterTools has released patches for two vulnerabilities in its SmarterMail email software, one of which is classified as critical. This flaw, identified as CVE-2026-24423, has a CVSS score of 9.3 and could allow attackers to execute arbitrary code on systems running affected versions of SmarterMail. Users of SmarterMail versions prior to build 9511 are particularly at risk. It's crucial for organizations using this software to update immediately to protect against potential exploitation. The existence of such a high-severity vulnerability underscores the importance of regular software updates and vigilance in cybersecurity practices.

Impact: SmarterMail versions prior to build 9511
Remediation: Users should update to SmarterMail build 9511 or later to mitigate the risks associated with this vulnerability.
Read Original

Ivanti has revealed two serious vulnerabilities in its Endpoint Manager Mobile (EPMM) software, identified as CVE-2026-1281 and CVE-2026-1340. These vulnerabilities are currently being exploited in zero-day attacks, meaning attackers have already taken advantage of them before any fix was made available. Organizations using EPMM are at risk, as these flaws could allow unauthorized access to sensitive mobile device management functions. The situation is urgent, as the vulnerabilities are actively being exploited in the wild, which could lead to data breaches or unauthorized control over managed devices. Users and companies are advised to monitor for updates and take immediate action to secure their systems.

Impact: Ivanti Endpoint Manager Mobile (EPMM)
Remediation: Users should apply any available patches or updates from Ivanti as soon as they are released. In the meantime, organizations are advised to limit access to the EPMM software and monitor for unusual activity.
Read Original

The Bizarre Bazaar campaign is exploiting vulnerabilities in poorly secured large language model (LLM) infrastructure. This includes self-hosted setups, unauthenticated APIs, and development environments that lack proper security measures. Attackers are taking advantage of these weaknesses to gain unauthorized access to potentially sensitive data and systems. Organizations that utilize LLMs, particularly in development or testing phases, may be at risk if they haven't implemented adequate protections. This situation serves as a wake-up call for companies to review their security practices surrounding AI technologies and ensure that all endpoints are properly secured.

Impact: Self-hosted LLM setups, unauthenticated APIs, development environments
Remediation: Organizations should implement authentication measures for APIs, secure development environments, and regularly audit their LLM setups for vulnerabilities.
Read Original

Researchers have discovered a method called 'semantic chaining' that allows attackers to manipulate large language models (LLMs) like Gemini Nano Banana and Grok 4. By breaking down a malicious prompt into smaller, discrete parts, these models can misinterpret the prompt's true intent, potentially leading to unintended outputs or actions. This vulnerability raises concerns for developers and users of LLMs, as it can be exploited to bypass safety features or generate harmful content. Companies that rely on these technologies must be aware of this tactic and take steps to improve their models' resilience against such manipulation. Addressing this issue is crucial to maintaining the integrity and safety of AI-driven applications.

Impact: Gemini Nano Banana, Grok 4
Remediation: Companies should enhance their models' ability to recognize and handle segmented prompts to prevent exploitation.
Read Original

A vulnerability in WinRAR, a popular file compression software, is being exploited by Russian and Chinese nation-state attackers, even though a patch was released last July to fix the issue. This flaw poses a significant risk, particularly to small and medium-sized businesses (SMBs), which may not have updated their software or may be unaware of the vulnerability. The fact that this exploitation is ongoing months after the patch was issued raises concerns about the security practices of many organizations. Companies using affected versions of WinRAR need to take immediate action to protect themselves from potential breaches. Staying updated with software patches is crucial, especially when attackers are targeting known vulnerabilities.

Impact: WinRAR versions prior to the patch released in July 2023
Remediation: Users should update to the latest version of WinRAR as per the July 2023 patch.
Read Original

Fortinet has confirmed a new zero-day vulnerability that is allowing attackers to exploit single sign-on (SSO) authentication for malicious logins. In response to the ongoing attacks, the company has temporarily disabled FortiCloud SSO authentication across all devices to mitigate the risk. This means that users relying on this feature for secure access may face disruptions while Fortinet works on a solution. The situation is particularly concerning as it puts sensitive information at risk and could lead to unauthorized access to critical systems. Companies using Fortinet products should monitor the situation closely and be prepared to implement any updates once they are released.

Impact: FortiCloud SSO authentication
Remediation: Temporarily disabled FortiCloud SSO authentication for all devices
Read Original

Researchers have identified two serious vulnerabilities in n8n, an open-source workflow automation tool, that could allow attackers to execute code remotely. These flaws are related to how n8n handles its sandboxing, which is supposed to isolate code execution for security. If exploited, these vulnerabilities could let malicious actors run arbitrary code on affected systems, potentially compromising sensitive data and system integrity. Users of n8n should take this issue seriously, as it poses significant risks to any workflows that utilize the platform. It's crucial for organizations to stay updated on these types of vulnerabilities to safeguard their operations.

Impact: n8n workflow automation tool
Remediation: Users should apply any available patches or updates from n8n and review their configurations to enhance security. Specific patch numbers or updates were not mentioned.
Read Original

Fortinet has issued patches for a serious vulnerability in its FortiOS software, identified as CVE-2026-24858, which has been actively exploited by attackers. This flaw allows unauthorized users to bypass Single Sign-On (SSO) authentication, posing a significant risk to organizations using affected systems. The vulnerability has a high CVSS score of 9.4, indicating its severity. It impacts several products, including FortiOS, FortiManager, and FortiAnalyzer. Companies utilizing these systems should prioritize applying the available patches to protect against potential breaches.

Impact: FortiOS, FortiManager, FortiAnalyzer
Remediation: Fortinet has started rolling out patches for CVE-2026-24858. Users are advised to apply these patches immediately to mitigate the risk of exploitation.
Read Original

SolarWinds has issued important security updates to address two serious vulnerabilities in its Web Help Desk software. The flaws include an authentication bypass that could allow unauthorized access and a remote command execution (RCE) vulnerability, which could enable attackers to run commands on affected systems. These issues affect users of the Web Help Desk, which is widely used in IT support environments. Organizations relying on this software need to act quickly, as these vulnerabilities could lead to significant security breaches if exploited. Users are advised to apply the updates provided by SolarWinds to mitigate these risks.

Impact: SolarWinds Web Help Desk software
Remediation: Users should apply the latest security updates released by SolarWinds to patch the vulnerabilities.
Read Original

Researchers from JFrog Security Research have identified two significant vulnerabilities in the n8n workflow automation platform. The most critical issue, tracked as CVE-2026-1470, has a CVSS score of 9.9 and involves an eval injection vulnerability that allows authenticated users to execute arbitrary code remotely. This flaw poses a severe risk, as it could potentially enable attackers to manipulate the system and access sensitive data. Users of n8n should take immediate action to secure their installations, especially those who rely on this platform for workflow automation. Prompt updates and monitoring are essential to mitigate risks associated with these vulnerabilities.

Impact: n8n workflow automation platform, versions not specified
Remediation: Users should update to the latest version of n8n to patch the vulnerabilities. Regularly review user permissions and limit access to the system to reduce risk.
Read Original

The article discusses the ongoing risk of password reuse, which is often overlooked by security teams focused on more obvious threats like phishing or malware. Many users tend to use similar passwords across different accounts, creating a vulnerability that can be exploited by attackers. This practice allows cybercriminals to gain access to sensitive information if they compromise one account. Organizations are urged to take this risk seriously and implement stronger password policies and user education to mitigate the problem. The article emphasizes that even seemingly minor password habits can lead to significant security breaches, making it crucial for companies to address these issues proactively.

Impact: N/A
Remediation: Implement stronger password policies, promote the use of password managers, and educate users on the risks of password reuse.
Read Original

Researchers at Koi have discovered a series of vulnerabilities known as 'PackageGate' affecting popular JavaScript package managers: NPM, PNPM, VLT, and Bun. These flaws allow attackers to bypass existing supply chain protections, potentially enabling them to execute malicious code within applications that rely on these package managers. This is particularly concerning given the widespread use of these tools in the development community, meaning that many developers and organizations could be at risk without realizing it. The vulnerabilities pose a serious threat to software integrity and the security of applications built using these package managers. Developers are urged to stay vigilant and implement necessary security measures to protect their projects.

Impact: NPM, PNPM, VLT, Bun
Remediation: Developers should monitor for updates from the respective package managers and apply any security patches as they become available.
Read Original

Fortinet has addressed a significant vulnerability tracked as CVE-2026-24858, which could allow attackers to bypass authentication and gain unauthorized access to devices linked to other FortiCloud accounts. This flaw presents a serious risk, as it enables malicious actors to potentially control devices that should be secure. Users and organizations utilizing FortiCloud services are particularly affected, as their account security could be compromised. Fortinet's swift action to patch this vulnerability is crucial to prevent exploitation and protect users' sensitive data. Companies using Fortinet products should ensure they apply the latest updates to mitigate this risk effectively.

Impact: FortiCloud services, devices registered to FortiCloud accounts.
Remediation: Fortinet has released patches to address the vulnerability. Users are advised to update their FortiCloud services and devices to the latest version as soon as possible.
Read Original
PreviousPage 17 of 35Next