Articles tagged "Critical"

Found 577 articles

SolarWinds has issued important security updates to address two serious vulnerabilities in its Web Help Desk software. The flaws include an authentication bypass that could allow unauthorized access and a remote command execution (RCE) vulnerability, which could enable attackers to run commands on affected systems. These issues affect users of the Web Help Desk, which is widely used in IT support environments. Organizations relying on this software need to act quickly, as these vulnerabilities could lead to significant security breaches if exploited. Users are advised to apply the updates provided by SolarWinds to mitigate these risks.

Impact: SolarWinds Web Help Desk software
Remediation: Users should apply the latest security updates released by SolarWinds to patch the vulnerabilities.
Read Original

Researchers from JFrog Security Research have identified two significant vulnerabilities in the n8n workflow automation platform. The most critical issue, tracked as CVE-2026-1470, has a CVSS score of 9.9 and involves an eval injection vulnerability that allows authenticated users to execute arbitrary code remotely. This flaw poses a severe risk, as it could potentially enable attackers to manipulate the system and access sensitive data. Users of n8n should take immediate action to secure their installations, especially those who rely on this platform for workflow automation. Prompt updates and monitoring are essential to mitigate risks associated with these vulnerabilities.

Impact: n8n workflow automation platform, versions not specified
Remediation: Users should update to the latest version of n8n to patch the vulnerabilities. Regularly review user permissions and limit access to the system to reduce risk.
Read Original
Actively Exploited

Recent analysis by Zscaler has revealed alarming security vulnerabilities in enterprise AI systems, with every system examined showing at least one critical flaw. The findings indicate that 90% of these systems can be compromised in less than 90 minutes. This is particularly concerning as businesses increasingly rely on AI tools for various operations. The implications are serious, as these vulnerabilities could lead to data breaches and unauthorized access to sensitive information. Companies utilizing AI technology must prioritize security measures to protect their systems and data from potential attacks.

Impact: Enterprise AI systems
Remediation: Companies should implement immediate security assessments and updates, strengthen access controls, and consider deploying additional threat detection systems.
Read Original

Cybersecurity researchers have identified that a group known as Mustang Panda, believed to be linked to the Chinese government, is using an updated backdoor called COOLCLIENT in cyber espionage campaigns. These attacks, which have been ongoing in 2025, primarily target government entities, allowing the attackers to steal sensitive data from compromised systems. This new version of COOLCLIENT enhances the group's capabilities, raising concerns about the potential for significant data breaches in critical government sectors. The implications of these attacks could lead to compromised national security and the exposure of sensitive governmental information. Organizations, especially those in the public sector, need to bolster their security measures to protect against such sophisticated threats.

Impact: Government entities
Remediation: Organizations should enhance their endpoint security, implement regular software updates, and conduct thorough security audits to detect and mitigate potential intrusions.
Read Original

OpenSSL has patched 12 vulnerabilities, including a high-severity flaw that allows remote code execution. This vulnerability was identified by a cybersecurity firm and poses significant risks for users and organizations relying on OpenSSL for secure communications. Attackers could exploit this flaw to execute arbitrary code on affected systems, potentially compromising sensitive data and operations. Users and organizations should prioritize applying the latest updates to safeguard their systems against potential attacks. The patch addresses critical issues that could affect a wide range of applications and services leveraging OpenSSL, making timely remediation essential.

Impact: OpenSSL versions prior to the latest patch
Remediation: Users should update to the latest version of OpenSSL to mitigate vulnerabilities.
Read Original

The CERT Coordination Center has launched the CERT UEFI Parser, an open-source tool designed to help cybersecurity researchers analyze Unified Extensible Firmware Interface (UEFI) software. This tool aims to simplify the examination of UEFI code, making it easier to identify various types of vulnerabilities that can be challenging to detect. By applying program analysis techniques, the parser extracts architectural details that can reveal security weaknesses within UEFI firmware. This initiative is particularly important as UEFI is critical in the boot process of modern devices, and vulnerabilities in this area can lead to serious security risks. The tool is available through the Software Engineering Institute at Carnegie Mellon University, marking a significant step forward in UEFI security research.

Impact: Unified Extensible Firmware Interface (UEFI) software
Remediation: N/A
Read Original

A newly discovered flaw in telnet servers exposes vulnerabilities in many legacy systems and Internet of Things (IoT) devices still using this outdated protocol for remote access. Despite telnet being largely replaced by more secure options, it remains in use across hundreds of thousands of devices, making them susceptible to potential attacks. Researchers have pointed out that this forgotten attack surface could allow unauthorized access to sensitive systems, putting data and operations at risk. Organizations relying on these systems need to assess their use of telnet and consider transitioning to more secure protocols to mitigate these risks. This situation underscores the importance of keeping security practices updated, even for older technologies that may still be in operation.

Impact: Legacy systems, IoT devices using telnet protocol
Remediation: Organizations should transition to more secure protocols and assess their current use of telnet.
Read Original

Nike is currently looking into a potential data breach after the World Leaks ransomware group leaked 1.4 terabytes of files that they claim to have stolen from the company. This incident raises concerns about the security of sensitive information held by one of the largest sportswear brands in the world. The leaked files could potentially contain customer data, company secrets, or other critical information, which might lead to further extortion attempts or data misuse. Nike's investigation is crucial not only for the company's reputation but also for the safety of its customers and business partners. As the situation unfolds, it highlights the ongoing threat posed by ransomware gangs targeting major corporations.

Impact: Nike's customer data, internal documents, proprietary designs, and other sensitive information.
Remediation: Nike is investigating the breach and has not specified any immediate remediation steps.
Read Original

A critical vulnerability has been identified in Grist-Core, a platform used for data management and collaboration. This security flaw allows attackers to escape the sandbox environment, leading to remote code execution through a malicious formula. Essentially, this means that someone could potentially run arbitrary code on the systems where Grist-Core is deployed, which poses a significant risk to users. Organizations using this software need to act quickly to protect their data and systems from exploitation. The details about the specific versions affected have not been disclosed, but the urgency of the situation suggests that immediate attention is required to prevent potential breaches.

Impact: Grist-Core
Remediation: Users should apply any available security patches and review configurations to limit execution of untrusted formulas.
Read Original

Researchers have discovered a critical vulnerability in the vm2 library, a popular Node.js sandbox used to execute untrusted code. This security flaw, identified as CVE-2026-22709, enables attackers to escape the sandbox environment and execute arbitrary code on the host system. This poses a significant risk to applications that rely on this library for secure code execution. Developers using vm2 should take immediate action to protect their systems, as the implications could lead to unauthorized access and control over sensitive data. It's crucial for users to stay informed about this vulnerability and implement necessary safeguards to prevent exploitation.

Impact: vm2 Node.js library
Remediation: Developers should update to the latest version of the vm2 library as soon as a patch is released. It's also advisable to review and restrict permissions and access controls for applications using vm2 to minimize potential risk.
Read Original
Poland Thwarts Russian Wiper Malware Attack on Power Plants

Hackread – Cybersecurity News, Data Breaches, AI, and More

Poland successfully thwarted a cyberattack involving Russian wiper malware aimed at its power and heating plants. This incident, which could have led to significant outages during the winter months, was detected and blocked by Polish officials before any damage occurred. The government has responded by tightening cybersecurity regulations to bolster defenses against potential future attacks. This incident underscores the ongoing tensions between Poland and Russia, particularly regarding cybersecurity threats to critical infrastructure. The prevention of this attack is crucial for maintaining energy stability during colder months, which could have severe implications for public safety and the economy.

Impact: Power and heating plants in Poland
Remediation: Tighter cybersecurity regulations implemented by Polish authorities
Read Original

Cybersecurity researchers have identified a JavaScript-based command-and-control framework named PeckBirdy, which has been utilized by China-aligned hackers since 2023. This framework has primarily targeted the Chinese gambling industry, as well as various Asian government entities and private organizations. Trend Micro reports that the flexibility of PeckBirdy allows these attackers to adapt their methods for different environments. The use of such sophisticated tools raises concerns about the security of critical sectors, especially in regions where these attacks are focused. It's crucial for organizations in the affected areas to enhance their security measures to defend against these ongoing threats.

Impact: Chinese gambling industry, Asian government entities, private organizations
Remediation: Organizations should enhance security measures and monitor for unusual activity related to PeckBirdy. Regular updates and employee training on phishing and other attack vectors are recommended.
Read Original

Researchers from SEC Consult have identified over 20 vulnerabilities in Dormakaba's physical access control systems, specifically those using the exos 9300 platform. These flaws could allow attackers to remotely unlock doors at major organizations, posing a significant security risk. The vulnerabilities are serious enough that they could be exploited to gain unauthorized access to sensitive areas within facilities. Organizations using Dormakaba systems should prioritize applying any patches or updates provided by the vendor to mitigate these risks. This discovery raises concerns about the security of physical access controls, which are essential for protecting sensitive locations.

Impact: Dormakaba exos 9300 physical access control systems
Remediation: Organizations should apply patches or updates provided by Dormakaba to address the vulnerabilities.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has released a guide aimed at helping federal agencies transition to post-quantum encryption. The guide serves as a 'shopping list' for tech buyers looking to upgrade their systems to protect against potential threats posed by quantum computing. However, many security professionals are skeptical, noting that most existing products and internet protocols are still not ready for this transition. This raises concerns about the overall preparedness of agencies to defend against future quantum attacks. As quantum technology advances, the need for updated encryption methods becomes increasingly urgent, making this guide a critical resource for agencies planning their cybersecurity strategies.

Impact: Federal agencies, encryption products, internet protocols
Remediation: Agencies should begin evaluating and updating their encryption systems and protocols in line with the guide's recommendations.
Read Original

A serious vulnerability has been discovered in Appsmith, an open-source low-code application platform, tracked as CVE-2026-22794. This flaw affects the authentication process, allowing attackers to hijack user accounts. Researchers have confirmed that this vulnerability is currently being exploited in the wild, raising significant concerns for organizations using the platform. Users of Appsmith should act quickly to secure their accounts and systems to prevent unauthorized access. As the exploitation of this vulnerability poses a real threat, it’s crucial for affected users to stay informed and take necessary precautions.

Impact: Appsmith platform, specifically vulnerable versions that have not been patched against CVE-2026-22794.
Remediation: Users should update to the latest version of Appsmith as soon as patches are available. In the interim, organizations should review their user account security measures and consider implementing additional authentication layers to protect against unauthorized access.
Read Original
PreviousPage 21 of 39Next