Articles tagged "Vulnerability"

Found 331 articles

Actively Exploited

Recent reports from BleepingComputer indicate that attackers are exploiting significant vulnerabilities in SolarWinds Web Help Desk, identified as CVE-2025-40551 and CVE-2026-26399. These flaws have been under active exploitation since mid-January, allowing intruders to deploy legitimate tools for unauthorized activities within affected systems. Organizations using SolarWinds Web Help Desk could be at risk, as these vulnerabilities could facilitate broader attacks or data breaches. It is crucial for companies to assess their systems for these vulnerabilities and apply necessary updates or patches to safeguard against potential intrusions. The ongoing exploitation of these flaws underscores the need for vigilance in maintaining software security.

Impact: SolarWinds Web Help Desk, versions affected not specified.
Remediation: Organizations should apply available patches for SolarWinds Web Help Desk and continuously monitor their systems for unusual activity. Regularly updating software and conducting security audits can also help mitigate risks associated with these vulnerabilities.
Read Original

The European Commission recently experienced a cyberattack that took advantage of two critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) software, identified as CVE-2026-1281 and CVE-2026-1340. These vulnerabilities allowed attackers to potentially compromise sensitive information and systems within the Commission. As a key institution in the EU, any breach could have significant implications for data security and operational integrity. The exploitation of these flaws underscores the urgent need for organizations using Ivanti EPMM to assess their security measures and apply necessary updates promptly. This incident serves as a reminder of the ongoing risks associated with unpatched software vulnerabilities.

Impact: Ivanti Endpoint Manager Mobile (EPMM) software, specifically versions vulnerable to CVE-2026-1281 and CVE-2026-1340.
Remediation: Organizations using Ivanti EPMM should immediately apply security patches released by Ivanti for CVE-2026-1281 and CVE-2026-1340. Regularly update software to the latest versions and implement security best practices to mitigate risks from similar vulnerabilities.
Read Original

A newly discovered vulnerability, identified as CVE-2026-1731, poses a serious risk to users of BeyondTrust software. This flaw allows for remote code execution without the need for user interaction, meaning that attackers could exploit it through relatively straightforward methods. Organizations using BeyondTrust products should take this threat seriously as it could lead to unauthorized access and control over their systems. Timely patching is crucial to mitigate the risks associated with this vulnerability, especially since it can be exploited before any authentication takes place. Users are advised to check for updates and apply any available patches immediately to protect their systems from potential attacks.

Impact: BeyondTrust software products (specific versions not mentioned)
Remediation: Users should apply the latest patches and updates provided by BeyondTrust as soon as they become available. Regularly checking for software updates is advised to ensure vulnerabilities are addressed promptly.
Read Original

A new botnet called SSHStalker has compromised approximately 7,000 Linux systems, primarily those hosted in the cloud. This botnet uses Internet Relay Chat (IRC) for control and automates attacks via Secure Shell (SSH) to gain access to these systems. The attackers are exploiting weak SSH credentials, making it crucial for system administrators to strengthen their password policies and implement key-based authentication. This incident highlights the ongoing vulnerability of Linux servers to automated attacks and the importance of maintaining strong security practices. Users need to be vigilant and consider regular audits of their SSH configurations to prevent unauthorized access.

Impact: Linux systems, particularly cloud-hosted environments using SSH
Remediation: Strengthen SSH credentials, implement key-based authentication, and conduct regular audits of SSH configurations.
Read Original

BeyondTrust has issued a patch for a serious remote code execution (RCE) vulnerability that affects its Remote Support (RS) and Privileged Remote Access (PRA) products. This vulnerability allows attackers to exploit the systems remotely by sending specially crafted requests, and alarmingly, it does not require authentication to do so. This means that unauthorized users could potentially gain control over affected systems, posing significant risks to organizations using these products. Users and companies should prioritize applying the latest patches to mitigate potential threats. Keeping systems updated is crucial to maintaining security against such vulnerabilities.

Impact: BeyondTrust Remote Support (RS), BeyondTrust Privileged Remote Access (PRA)
Remediation: Users should apply the latest patches provided by BeyondTrust to secure their systems against this vulnerability.
Read Original

Dutch agencies, including the Data Protection Authority and the Council for the Judiciary, have confirmed cyberattacks that exploited vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM). These attacks resulted in the exposure of employee contact data. The flaws in Ivanti EPMM were recently disclosed, allowing attackers to breach the systems of these government bodies. This incident raises concerns about the security of sensitive personal information and the potential for further exploitation of these vulnerabilities. Authorities have reported the incidents to parliament, emphasizing the need for improved security measures in public sector agencies.

Impact: Ivanti Endpoint Manager Mobile (EPMM), Dutch Data Protection Authority, Council for the Judiciary
Remediation: Update Ivanti EPMM to the latest version and apply security patches as they become available.
Read Original

The Dutch Data Protection Authority and the Council for the Judiciary have confirmed that their systems were compromised due to a zero-day exploit of Ivanti Endpoint Manager Mobile (EPMM). This vulnerability, recently disclosed, allowed attackers to access sensitive employee contact information. The breach was reported to parliament on January 29, indicating that it poses a significant risk to the privacy of individuals whose data was exposed. The incident underscores the importance of timely patching and system security, as organizations are urged to address these vulnerabilities to protect against future attacks.

Impact: Ivanti Endpoint Manager Mobile (EPMM), Dutch Data Protection Authority, Council for the Judiciary
Remediation: Organizations should immediately apply patches provided by Ivanti for Endpoint Manager Mobile. Additionally, it is recommended to review security configurations and access controls to mitigate risk from similar vulnerabilities.
Read Original

Recent testing has shown that the speaker in Apple's AirTags can be easily disabled using a common tool, like a spudger, in less than two minutes. This raises significant privacy concerns, as disabling the speaker could prevent users from hearing alerts that the device is tracking them. This situation is particularly alarming for individuals who might be targeted for unwanted tracking or stalking, as it could allow malicious actors to exploit the AirTags without detection. While Apple has marketed these devices as a way to help users locate lost items, this vulnerability could undermine their intended purpose. Users and privacy advocates are urging Apple to address this issue to enhance the security features of the product.

Impact: Apple AirTag
Remediation: Apple should consider implementing design changes to prevent the speaker from being easily disabled.
Read Original

A Chinese cyber espionage group known as UNC3886 has successfully infiltrated Singapore's four largest telecom providers: Singtel, StarHub, M1, and Simba. This breach occurred at least once last year, raising concerns about the security of sensitive user data and the potential for espionage. The attackers' motives likely include gathering intelligence and accessing confidential information. The incident underscores the vulnerability of critical infrastructure in the telecommunications sector, which is essential for both personal and national communications. This breach could have significant implications for customer privacy and national security, prompting a need for enhanced security measures across the industry.

Impact: Singtel, StarHub, M1, Simba
Remediation: Companies should enhance their security protocols, conduct regular security audits, and ensure employee training on cybersecurity best practices.
Read Original

The ransomware group known as Warlock Gang has successfully breached SmarterTools by exploiting vulnerabilities in the company's SmarterMail product. This breach raises significant concerns for organizations that rely on SmarterMail for email communication, as attackers could potentially access sensitive information. The incident serves as a reminder of the importance of regularly updating and patching software to protect against known vulnerabilities. Users of SmarterMail should be particularly vigilant and ensure their systems are secure to prevent further exploitation. As the cyber landscape continues to evolve, incidents like this highlight the ongoing risks businesses face from ransomware attacks.

Impact: SmarterMail
Remediation: Users should apply the latest security patches for SmarterMail and regularly review their security configurations.
Read Original

SmarterTools has reported that its network was breached by the Warlock ransomware gang, which gained access through a vulnerability in the company's email system. Fortunately, this incident did not compromise any business applications or account data, meaning that sensitive user information remains secure. However, the breach raises concerns about the security of email systems and the potential for ransomware attacks targeting software vulnerabilities. Organizations using SmarterTools should review their email security practices and ensure they are employing appropriate safeguards against such threats. This incident serves as a reminder that even established software can have weaknesses that attackers might exploit.

Impact: SmarterTools email system
Remediation: Organizations should review email security practices and apply necessary updates or patches as they become available.
Read Original

BeyondTrust has issued a warning about a serious vulnerability in its Remote Support (RS) and Privileged Remote Access (PRA) software. This flaw could let unauthorized attackers run arbitrary code on affected systems, posing a significant security risk. Users of these software products are strongly advised to apply the necessary patches to protect their systems from potential exploitation. The vulnerability's nature means that it could be exploited without requiring any form of authentication, making it particularly dangerous. Organizations using BeyondTrust's software should prioritize updating to secure their environments against this threat.

Impact: BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) software
Remediation: Customers should patch their BeyondTrust Remote Support and Privileged Remote Access software as soon as possible.
Read Original

In December 2025, vulnerabilities in SolarWinds Web Help Desk instances were exploited, allowing attackers to gain initial access to compromised systems. This incident raises concerns for organizations using SolarWinds products, as it indicates that these flaws may have been leveraged as zero-day exploits. Such vulnerabilities can lead to unauthorized access and potential data breaches, making it crucial for affected companies to address these security gaps promptly. Users should be vigilant and monitor their systems for unusual activity while applying any available patches or updates. The incident serves as a reminder of the ongoing risks associated with third-party software vulnerabilities.

Impact: SolarWinds Web Help Desk instances
Remediation: Organizations should apply any available patches or updates from SolarWinds and monitor their systems for unauthorized access.
Read Original

Huntress has reported an ongoing attack exploiting vulnerabilities in SolarWinds Web Help Desk software. Attackers are targeting unpatched versions of this tool to execute remote code, which allows them to install Zoho ManageEngine software for persistent access and Velociraptor for control over compromised systems. This incident was confirmed on February 7, 2026, and it raises significant concerns for organizations that rely on SolarWinds products, as it highlights the risks associated with unaddressed software vulnerabilities. Companies using this software should prioritize patching to safeguard against these exploits and prevent unauthorized access to their systems.

Impact: SolarWinds Web Help Desk, Zoho ManageEngine, Velociraptor
Remediation: Organizations should update to the latest patched versions of SolarWinds Web Help Desk to mitigate these vulnerabilities.
Read Original

SmarterTools has reported a ransomware attack that compromised a data center used for quality control testing. The breach occurred due to a vulnerability in one of SmarterTools' own products, which allowed hackers to infiltrate their systems. As a result, customers have been affected, although specific details on the extent of the impact have not been disclosed. This incident raises concerns about the security of software products, especially those used in business environments. Companies using SmarterTools' services should review their security measures and remain vigilant for any unusual activity.

Impact: SmarterTools products, data center operations
Remediation: Customers should review their security protocols and monitor for unusual activity. Specific patches or updates were not mentioned.
Read Original
PreviousPage 2 of 23Next