Articles tagged "Update"

Found 137 articles

Last week, security researchers discovered that ScreenConnect servers were vulnerable to attacks due to misconfigurations, potentially allowing unauthorized access to sensitive data. Additionally, a flaw in Microsoft SharePoint was exploited, putting numerous organizations at risk. This vulnerability could allow attackers to execute malicious code or gain access to restricted information. Both incidents emphasize the need for companies to regularly review their security settings and update their systems to protect against these types of vulnerabilities. With many businesses relying on these platforms, the implications of these security issues could be significant, affecting operational integrity and data confidentiality.

Impact: ScreenConnect, Microsoft SharePoint
Remediation: Organizations are advised to review and update their security configurations for ScreenConnect and apply any available patches for Microsoft SharePoint to mitigate these vulnerabilities.
Read Original

Ubiquiti has released patches to address a critical vulnerability in its UniFi Network application, specifically affecting versions 10.1.85 and earlier. The vulnerability, tracked as CVE-2026-22557, poses significant risks to users who have not yet updated their software. This flaw could potentially allow attackers to exploit the system, compromising network security. Users of the affected versions are strongly advised to update to the latest version to safeguard their networks. The urgency of this patch highlights the ongoing need for regular software updates to protect against evolving threats.

Impact: UniFi Network application versions 10.1.85 and earlier.
Remediation: Users should update their UniFi Network application to the latest version to mitigate the vulnerability. Specific patch details are not provided, but upgrading to the most recent version is crucial.
Read Original

Oracle has issued an emergency security update to address a serious vulnerability in its Identity Manager and Web Services Manager products, identified as CVE-2026-21992. This flaw allows attackers to execute remote code without needing any authentication, which poses a significant risk to organizations using these systems. The vulnerability could potentially be exploited to gain unauthorized access and control over sensitive information. Users of Oracle's Identity Manager and Web Services Manager should prioritize applying the update to protect their systems from potential attacks. This incident underscores the ongoing need for vigilance in software security, particularly with products that manage identity and access controls.

Impact: Oracle Identity Manager, Oracle Web Services Manager
Remediation: Oracle has released an out-of-band security update to address CVE-2026-21992. Users are advised to apply the latest patches immediately to mitigate this vulnerability.
Read Original

Aura, a cybersecurity firm, has reported a data breach that affects approximately 900,000 records. The breach occurred after an employee was targeted in a phone phishing attack, which allowed attackers to steal information from a marketing tool used by the company. This incident raises concerns about the effectiveness of employee training in recognizing phishing attempts and the security measures in place for sensitive data. Users whose information may have been compromised should remain vigilant about potential follow-up phishing attempts or identity theft. The breach serves as a reminder for organizations to continuously update their security protocols and educate employees about the risks of social engineering attacks.

Impact: 900,000 records from Aura's marketing tool
Remediation: Companies should enhance employee training on recognizing phishing attempts and review security measures for data protection.
Read Original

Ubiquiti has addressed two vulnerabilities in its UniFi Network Application, including a serious flaw that could let attackers take control of user accounts. This vulnerability is particularly concerning as it affects the security of network management for users, potentially allowing unauthorized access to sensitive information and settings. Users of the application should ensure they update to the latest version to mitigate this risk. The company has emphasized the importance of applying these patches promptly to maintain network security. As cyber threats continue to evolve, staying updated with software patches is crucial for protecting against potential account takeovers.

Impact: Ubiquiti UniFi Network Application
Remediation: Users should update to the latest version of the UniFi Network Application to apply the patches.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about active exploitation of a recently patched vulnerability in SharePoint, identified as CVE-2026-20963. This remote code execution flaw allows attackers to run malicious code on affected systems, posing a significant risk to organizations using the software. Microsoft released a patch for this vulnerability back in January, but the discovery of in-the-wild exploitation suggests that some users may not have applied the update. Organizations using SharePoint should prioritize implementing the latest security updates to protect against potential breaches. Failing to address this vulnerability could lead to unauthorized access and data compromise, making it crucial for companies to stay vigilant and proactive in their cybersecurity practices.

Impact: SharePoint, affected versions unspecified.
Remediation: Organizations should apply the Microsoft patch released in January 2026 for CVE-2026-20963 to mitigate the risk of exploitation.
Read Original

A phishing attempt targeting a C-suite executive at cybersecurity firm Outpost24 recently came to light. The attackers used trusted brands and domains to trick the executive into revealing their login credentials. Although the attack was ultimately unsuccessful, it raises concerns about the vulnerabilities even experienced professionals face when dealing with sophisticated phishing schemes. This incident serves as a reminder for organizations to remain vigilant and reinforce security training, particularly for high-level staff who are often prime targets for attackers. The tactics employed in this case reflect the evolving strategies of cybercriminals, making it crucial for companies to continually update their defenses against such threats.

Impact: Outpost24, C-suite executive credentials
Remediation: Companies should enhance security awareness training for employees, particularly executives, and implement multi-factor authentication to protect against phishing attacks.
Read Original

Microsoft has released an out-of-band update to address three vulnerabilities in Windows 11's Routing and Remote Access Service (RRAS). The vulnerabilities, identified as CVE-2026-25172, CVE-2026-25173, and CVE-2026-26111, could potentially allow remote code execution when users connect to a malicious server. This is a serious concern as it could enable attackers to execute harmful code on affected systems. Users of Windows 11 should ensure they apply the latest updates to protect their devices from these risks. The prompt release of this patch reflects the urgency in addressing vulnerabilities that can be exploited remotely, highlighting the need for users to stay vigilant about software updates.

Impact: Windows 11, Routing and Remote Access Service (RRAS)
Remediation: Users should apply the latest updates provided by Microsoft to address the vulnerabilities. Specific patch numbers or versions were not mentioned, but keeping Windows 11 updated is essential.
Read Original
SQL Injection Vulnerability in Ally WordPress Plugin Exposes 200K+ Sites

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A serious SQL injection vulnerability has been discovered in the Ally WordPress plugin, putting over 200,000 websites at risk of data theft. This flaw allows attackers to manipulate database queries, potentially exposing sensitive user information. Although a patch has been released to fix the issue, many installations remain unpatched and therefore vulnerable. Website owners are urged to apply the update as soon as possible to protect their sites and users. The ongoing risk highlights the importance of timely software updates in safeguarding against cyber threats.

Impact: Ally WordPress plugin
Remediation: Patch released; users should update to the latest version of the Ally plugin.
Read Original

An international law enforcement operation has successfully dismantled SocksEscort, a criminal proxy service that had infected around 369,000 residential and small business routers across 163 countries. The U.S. Department of Justice revealed that this botnet was used for large-scale fraud, leveraging malware to control the infected routers. Users of these routers were largely unaware that their devices had been compromised. The operation underscores the ongoing threat posed by botnets and the importance of securing home and business networks. With thousands of routers involved, this incident serves as a reminder for individuals and businesses to regularly update their devices and apply security patches to protect against such malware infections.

Impact: Residential and small business internet routers
Remediation: Users should secure their routers by updating firmware, changing default passwords, and applying available security patches.
Read Original
Actively Exploited

A recent security vulnerability has been identified in several widely-used software applications, affecting users and businesses alike. This vulnerability allows attackers to gain unauthorized access to sensitive data, putting personal and organizational information at risk. The affected products include popular content management systems and cloud services, which are used by millions of individuals and enterprises. Experts urge users to update their software immediately to protect against potential exploitation. Failure to address this issue could lead to significant data breaches and financial loss for affected parties.

Impact: Popular content management systems and cloud services
Remediation: Users are advised to update to the latest software versions provided by vendors.
Read Original

A new strain of malware called Slopoly has been linked to an Interlock ransomware attack, allowing attackers to infiltrate a compromised server and remain undetected for over a week. This malware is believed to be generated using AI tools, showcasing the evolving capabilities of cybercriminals. During this time, sensitive data was stolen, raising concerns for organizations that may be targeted. The incident highlights the need for enhanced security measures to detect and respond to such sophisticated attacks. Companies must remain vigilant and update their defenses to protect against similar threats in the future.

Impact: Interlock ransomware; compromised servers; potentially various organizations affected
Remediation: Organizations should implement robust monitoring solutions, regularly update security protocols, and conduct employee training on recognizing suspicious activity.
Read Original

Splunk and Zoom recently addressed serious vulnerabilities in their software that could allow attackers to execute arbitrary shell commands or gain elevated privileges. These flaws are categorized as critical and high-severity, posing significant risks to users and organizations using these platforms. The vulnerabilities could potentially enable unauthorized access and control over systems, which is particularly concerning for businesses that rely on these tools for communication and data analysis. Users are urged to update their software immediately to mitigate these risks. Both companies have released patches to fix the issues, and it’s crucial for affected users to implement these updates as soon as possible.

Impact: Splunk software, Zoom application
Remediation: Patches released by Splunk and Zoom; users should update their software immediately.
Read Original

A supply chain attack has impacted around 100,000 websites, originally thought to be linked to China but now connected to North Korea. Researchers discovered that an infostealer malware infection was involved, which indicates that the attackers may have been targeting sensitive information from these sites. The incident raises concerns about the security of web applications and the potential for further exploitation as many organizations rely on third-party libraries. This attack serves as a reminder for website owners to regularly update their software and monitor for unusual activity to safeguard against similar threats in the future.

Impact: Websites using Polyfill libraries
Remediation: Website owners should update their Polyfill libraries and monitor for any signs of compromise.
Read Original

The article discusses the ongoing challenge of securing outdated industrial controllers that are still in use across various sectors in the U.S. Many of these controllers date back 30 years, and some were developed by individuals who have since passed away, complicating efforts to update or secure the technology. This situation is concerning because these legacy systems can be vulnerable to cyberattacks, yet they are still critical for operations in industries such as manufacturing and utilities. As these devices are often sold on platforms like eBay, there is a growing concern about who is acquiring and potentially exploiting these systems. The article emphasizes the need for organizations to prioritize the security of these aging technologies to prevent potential breaches.

Impact: 30-year-old industrial controllers
Remediation: Organizations should assess their use of legacy industrial controllers and implement security measures, such as network segmentation and regular security audits, to mitigate risks.
Read Original
PreviousPage 3 of 10Next