Articles tagged "Vulnerability"

Found 517 articles

The European Space Agency (ESA) has confirmed that an external server breach occurred recently, although specific details about the nature of the security issue remain vague. The agency has stated that it is investigating the incident to understand the extent of the breach and what data might have been affected. This incident raises concerns about the security of sensitive information related to space missions and research, especially given the increasing reliance on digital infrastructure in the aerospace sector. The ESA's acknowledgment of the breach underscores the vulnerability of even highly specialized organizations to cyber threats. As investigations continue, stakeholders and the public will be watching closely for updates on the implications of this breach.

Impact: External servers used by the European Space Agency
Remediation: N/A
Read Original
RondoDox Botnet is Using React2Shell to Hijack Thousands of Unpatched Devices

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Hackers using the RondoDox botnet are exploiting a vulnerability in Next.js known as React2Shell to take control of over 90,000 unpatched devices. This includes a range of products such as routers, smart cameras, and small business websites. The attack is particularly concerning because it targets devices that often lack regular updates or security patches, making them easy targets for cybercriminals. Users of these devices should be vigilant and consider updating their systems to protect against this growing threat. The scale of the devices affected raises alarms about the potential for widespread disruption if left unaddressed.

Impact: Routers, smart cameras, small business websites
Remediation: Users should update their Next.js applications to the latest version and ensure that all devices are patched against known vulnerabilities.
Read Original

Over 10,000 Fortinet firewalls are currently at risk due to a two-factor authentication (2FA) bypass vulnerability that has been known for five years. This vulnerability allows attackers to exploit systems that have not implemented proper security measures, potentially granting them unauthorized access to sensitive data and networks. The issue is particularly pressing because it affects devices that are publicly accessible on the internet, increasing the likelihood of exploitation. Organizations using these firewalls need to act quickly to secure their systems and protect against potential breaches. It's crucial for users to verify their configurations and apply any available updates to mitigate this serious risk.

Impact: Fortinet firewalls, specifically those exposed to the internet and not patched against the 2FA bypass vulnerability.
Remediation: Organizations should immediately review their firewall configurations and apply any available security patches. Users are advised to disable the vulnerable 2FA feature if possible and ensure that their systems are not exposed to the internet without additional security measures. Regularly updating firmware and monitoring for unauthorized access attempts are also recommended.
Read Original

The RondoDox botnet has been actively exploiting the React2Shell vulnerability to target Next.js servers since December. This vulnerability allows attackers to compromise systems that are not properly secured, potentially leading to unauthorized access and control. Organizations using Next.js should be particularly vigilant, as the botnet's operators are weaponizing this flaw to expand their reach. It’s crucial for companies to implement security measures to protect their servers from these types of attacks. As the situation develops, users need to stay informed about their server configurations and ensure they are updated against known vulnerabilities.

Impact: Next.js servers
Remediation: Organizations should apply security patches for Next.js and review server configurations to mitigate the React2Shell vulnerability.
Read Original

In April and May 2023, a Chinese advanced persistent threat (APT) group exploited a zero-day vulnerability in Ivanti's Endpoint Mobile Management (EPMM) platform, impacting thousands of organizations. This attack allowed unauthorized access and control over mobile devices managed through Ivanti's software, raising serious concerns about the security of sensitive data within those systems. The incident serves as a stark reminder of the vulnerabilities that can exist in widely used management tools. Security experts warn that similar attacks could occur again if organizations do not take proactive measures to secure their systems. Companies using Ivanti EPMM should assess their security posture and implement necessary updates to prevent future breaches.

Impact: Ivanti Endpoint Mobile Management (EPMM) platform, affecting thousands of organizations.
Remediation: Organizations should immediately update their Ivanti EPMM software to the latest versions and apply any security patches released by Ivanti. Additionally, companies should review their security configurations and implement stricter access controls to mitigate the risk of similar attacks in the future.
Read Original

The RondoDox botnet has been identified exploiting a serious vulnerability known as React2Shell (CVE-2025-55182) to compromise Next.js servers. This flaw allows attackers to inject malware and cryptominers into systems that have not been properly secured. Organizations using Next.js frameworks are particularly at risk, as the botnet targets these servers directly. This incident underscores the necessity for companies to regularly update their software and apply security patches to prevent such attacks. The ongoing exploitation of this vulnerability poses significant risks to data integrity and can lead to unauthorized resource usage, impacting both performance and costs for affected users.

Impact: Next.js servers, specifically those vulnerable to the React2Shell flaw (CVE-2025-55182)
Remediation: Organizations should immediately update their Next.js servers to the latest version that addresses the React2Shell vulnerability. Regularly applying security patches and conducting vulnerability assessments are also recommended to mitigate risks from similar exploits.
Read Original

IBM has identified a serious vulnerability in its API Connect software, classified as CVE-2025-13915. Rated 9.8 out of 10 on the CVSS scale, this flaw allows remote attackers to bypass authentication, potentially granting them unauthorized access to the application. This issue poses a significant risk to organizations using API Connect, as it could lead to data breaches and other malicious activities. Users of the software are advised to take immediate action to protect their systems. With this vulnerability being so critical, it is essential for companies to stay informed and apply any necessary updates or patches as soon as they become available.

Impact: IBM API Connect
Remediation: Organizations should monitor for updates and apply patches from IBM as soon as they are released. It's also recommended to review authentication mechanisms and consider implementing additional security measures to mitigate risks until a patch is available.
Read Original

IBM has issued a warning about a serious authentication bypass vulnerability in its API Connect platform. This flaw could allow attackers to gain unauthorized access to applications remotely, putting sensitive data at risk. Businesses using this enterprise tool should prioritize applying the necessary patches to safeguard their systems. The vulnerability affects various versions of the API Connect platform, making it critical for companies to act swiftly to prevent potential breaches. Ignoring this issue could lead to significant security incidents and data compromises.

Impact: IBM API Connect enterprise platform
Remediation: Customers are urged to apply the latest patches provided by IBM to mitigate the vulnerability.
Read Original

The European Space Agency (ESA) has confirmed a security breach that affected its external science servers. The incident came to light after a hacker attempted to sell stolen data from these servers. While the ESA is currently investigating the breach, details about the extent of the data compromised have not been fully disclosed. This incident raises concerns about the security of sensitive scientific data and the potential implications for ongoing research and collaboration within the space sector. The breach highlights the increasing vulnerability of even highly specialized organizations to cyberattacks, underscoring the need for robust cybersecurity measures.

Impact: European Space Agency external science servers
Remediation: N/A
Read Original

A serious vulnerability known as MongoBleed (CVE-2025-14847) was disclosed shortly after Christmas 2023, allowing attackers to remotely access and leak memory from unpatched MongoDB servers using zlib compression, without requiring any authentication. This flaw primarily affects deployments of MongoDB Server that utilize zlib network compression, a common feature in many setups. The vulnerability is significant because it exposes sensitive data stored in these databases, potentially impacting organizations across the U.S., China, and the EU. Cybersecurity experts are urging companies that use MongoDB to assess their systems for this vulnerability and apply necessary updates or patches to protect against exploitation. The situation highlights ongoing security challenges in the management of popular open-source database systems.

Impact: MongoDB Server deployments using zlib network compression
Remediation: Organizations should immediately patch their MongoDB servers to the latest version that addresses this vulnerability. Additionally, disabling zlib compression on affected servers can mitigate the risk until a patch is applied. Regular security audits and updates are recommended to ensure all systems remain secure.
Read Original

Sax, a major US accounting firm, has revealed a data breach that has affected around 220,000 individuals. The breach was detected over a year ago, but the firm took considerable time to investigate the incident thoroughly. While specific details about how the breach occurred have not been disclosed, it raises significant concerns about the security of sensitive financial information. Affected individuals may need to monitor their accounts closely for any signs of unauthorized activity. This incident highlights the ongoing vulnerability of even well-established firms in protecting client data against cyber threats.

Impact: Personal data of approximately 220,000 individuals, including financial information.
Remediation: N/A
Read Original

On December 26, 2023, the Oltenia Energy Complex, Romania's largest coal-based energy producer, fell victim to a ransomware attack attributed to the Gentlemen ransomware group. The attack severely disrupted the company's IT infrastructure, impacting its ability to operate effectively. Although specific details about the extent of the damage or data breaches have not been disclosed, the incident raises concerns about the vulnerability of critical infrastructure to cyber threats. As energy providers are essential for public services, such attacks can significantly affect energy supply and operational stability. Authorities and cybersecurity experts are likely to investigate the incident further to understand its implications and improve defenses against similar attacks in the future.

Impact: Oltenia Energy Complex IT infrastructure
Remediation: N/A
Read Original
Actively Exploited

In 2025, several significant cybersecurity threats emerged, most notably the global attacks attributed to a group known as Salt Typhoon. These attacks targeted multiple sectors, causing widespread concern among businesses and government agencies alike. Additionally, the discovery of a vulnerability named React2Shell raised alarms due to its potential impact on systems using React framework, which is widely adopted in web development. Researchers emphasized that this vulnerability could allow attackers to execute arbitrary code, putting countless applications at risk. Organizations are urged to review their security measures and apply necessary updates to safeguard against these evolving threats.

Impact: React framework applications, various organizations targeted by Salt Typhoon
Remediation: Apply security patches for React framework; enhance monitoring and incident response plans for organizations targeted by Salt Typhoon.
Read Original

Fortinet has issued a warning about ongoing attacks that exploit an old vulnerability in its FortiOS software, identified as CVE-2020-12812. This flaw allows attackers to bypass two-factor authentication, which can significantly compromise the security of affected systems. Organizations using FortiOS should be particularly vigilant, as this vulnerability has resurfaced in active attacks. The potential for unauthorized access puts sensitive data at risk, making it critical for users to address this issue promptly. Cybersecurity teams are urged to review their systems and implement necessary updates to safeguard against these threats.

Impact: FortiOS versions that are vulnerable to CVE-2020-12812, particularly those configured with two-factor authentication.
Remediation: Users should apply the latest patches for FortiOS as provided by Fortinet. It is also recommended to review and strengthen two-factor authentication configurations and monitor system access logs for any suspicious activities.
Read Original
Critical 0day flaw Exposes 70k XSpeeder Devices as Vendor Ignores Alert

Hackread – Cybersecurity News, Data Breaches, AI, and More

Researchers have identified a critical unpatched vulnerability, designated CVE-2025-54322, in XSpeeder networking devices, which are widely used in industrial and branch environments. Approximately 70,000 devices are affected, leaving them open to potential exploitation. The flaw was discovered by AI agents, but the vendor has not addressed the alert, raising concerns about the security of these devices. This situation poses a significant risk, as attackers could exploit the vulnerability to gain unauthorized access or disrupt operations. Companies using XSpeeder devices should take immediate action to assess their security posture and implement necessary safeguards to protect their networks.

Impact: XSpeeder networking devices, approximately 70,000 units in industrial and branch settings.
Remediation: Companies should evaluate their XSpeeder devices for potential exposure and consider implementing network segmentation and monitoring to mitigate risks. Regularly updating security protocols and reviewing access controls can also help protect against exploitation until a patch is made available.
Read Original
PreviousPage 25 of 35Next