Articles tagged "Update"

Found 89 articles

Cisco has addressed a serious vulnerability in its AsyncOS software that has been exploited since November 2025. This zero-day flaw specifically affects Secure Email Gateway (SEG) appliances, which are used by organizations to filter and protect email traffic. Attackers have been able to exploit this weakness, putting sensitive data at risk and potentially compromising email communications for users relying on these appliances. The timely patch is crucial for organizations to secure their email systems and prevent further exploitation. Companies using these SEG appliances should prioritize applying the update to safeguard against these attacks.

Impact: Cisco Secure Email Gateway (SEG) appliances running AsyncOS.
Remediation: Cisco has released a patch for AsyncOS to fix the zero-day vulnerability. Users should immediately update their SEG appliances to the latest version provided by Cisco to mitigate the risk of exploitation.
Read Original

Security researcher Eaton Zveare identified five serious vulnerabilities in Bluspark's Bluvoyix platform, which is used in shipping and supply chain management. Among these flaws were the use of plaintext passwords and an unauthenticated API, both of which could potentially allow unauthorized access to sensitive data. This incident raises concerns for companies relying on Bluvoyix, as attackers could exploit these weaknesses to gain access to critical operational information. Bluspark has since released patches to address these vulnerabilities, but the exposure of such significant flaws underscores the need for robust security practices in software development. Users of the platform should ensure they update to the latest version to mitigate these risks.

Impact: Bluspark's Bluvoyix shipping and supply chain platform
Remediation: Patches have been released to address the vulnerabilities; users should update to the latest version.
Read Original

The January Patch Tuesday updates for Windows include important changes to Secure Boot, which safeguards computers against bootkit malware. Secure Boot is a security feature that ensures only trusted software is loaded during the startup process. The updates address expiring certificates that could compromise this protection if not renewed. Users and IT administrators are urged to install these patches promptly to mitigate the risk of bootkit attacks, which can allow malicious software to take control of a system before the operating system loads. Keeping Secure Boot updated is crucial for maintaining the integrity and security of Windows PCs.

Impact: Windows PCs with Secure Boot enabled
Remediation: Install the January Patch Tuesday updates for Windows to refresh Secure Boot certificates.
Read Original

A hacker has claimed to have fully breached Max Messenger, a messaging app popular in Russia, and is threatening to leak sensitive user data and backend systems unless their demands are met. This situation raises alarms for users of the app, as it could expose personal information and compromise the security of communications on the platform. The hacker's claims have not yet been verified, and the company has not publicly responded to the threat. If the breach is legitimate, it could have serious implications for user privacy and trust in the app. The incident underscores the ongoing risks associated with messaging platforms and the potential for cybercriminals to exploit vulnerabilities.

Impact: Max Messenger (Russia)
Remediation: N/A
Read Original

Recent updates to Chrome and Firefox have patched 26 security flaws, including several high-severity vulnerabilities that could allow attackers to execute arbitrary code. Chrome version 144 and Firefox version 147 are now available, and users are strongly encouraged to update their browsers to protect against potential exploits. These vulnerabilities can affect a wide range of users, making it crucial for individuals and organizations to stay current with software updates. Ignoring these patches could leave systems open to attacks that might compromise sensitive data or disrupt operations. The updates not only fix the bugs but also enhance overall browser security, which is vital in today’s digital landscape.

Impact: Chrome 144, Firefox 147
Remediation: Update to Chrome 144 or Firefox 147
Read Original

Recently, over 100,000 records containing valid PayPal credentials were claimed to have been leaked by cybercriminals. However, researchers from Cybernews have dismissed these claims, stating that the data appears to be outdated and likely sourced from previous infostealer logs rather than a new breach. This situation raises concerns for users who might worry about the security of their PayPal accounts, even though the current evidence suggests there is no fresh compromise. It's important for individuals to remain vigilant and regularly update their passwords, regardless of the validity of this specific claim. The incident serves as a reminder of the ongoing risks associated with credential theft and the necessity for users to use strong, unique passwords for their accounts.

Impact: PayPal credentials
Remediation: Users should update passwords and enable two-factor authentication for added security.
Read Original

In January 2026, a significant software update addressed 114 Common Vulnerabilities and Exposures (CVEs), including three that were categorized as zero-days. These vulnerabilities could potentially allow attackers to execute arbitrary code or escalate privileges on affected systems. Notably, the patched software includes widely used products from major vendors, though specific names were not disclosed. This update is crucial as it aims to protect users from potential exploits that could compromise sensitive data or system integrity. Companies and users are strongly advised to apply the updates promptly to mitigate any risks associated with these vulnerabilities.

Impact: Major software products from unspecified vendors
Remediation: Users should apply the January 2026 patches as soon as possible.
Read Original

Trend Micro has released patches for a significant code execution vulnerability in its Apex Central product. This flaw could allow attackers to execute arbitrary code, putting systems at risk. Tenable has since provided proof-of-concept code and technical details, which could assist malicious actors in exploiting the vulnerability if users do not update their systems promptly. Companies using Apex Central need to apply the patches to protect their networks from potential attacks. The urgency of this update is underscored by the fact that vulnerabilities of this nature can lead to serious breaches if left unaddressed.

Impact: Apex Central
Remediation: Patches available from Trend Micro for the vulnerabilities in Apex Central.
Read Original

Cybersecurity researchers have uncovered that a group of Chinese-speaking hackers exploited vulnerabilities in VMware ESXi, using a compromised SonicWall VPN appliance to deploy an exploit toolkit. This toolkit appears to have been created over a year before the vulnerabilities were publicly disclosed. This means that the attackers had access to these exploits long before companies were aware of their existence, potentially allowing them to infiltrate networks unnoticed. Organizations using VMware ESXi should be particularly vigilant, as the vulnerabilities could lead to significant security breaches. The incident underscores the need for companies to regularly update their systems and monitor for unusual activity, as these types of attacks can have serious implications for data security.

Impact: VMware ESXi, SonicWall VPN appliances
Remediation: Organizations should apply the latest security patches for VMware ESXi and SonicWall VPN appliances, monitor for unusual activity, and consider enhancing their network security protocols.
Read Original

A serious vulnerability has been discovered in HPE OneView, a management tool used for IT infrastructure. This flaw allows attackers to execute code remotely without needing any authentication, which poses a significant risk to organizations using this software. As the vulnerability is actively being exploited, affected companies must act quickly to protect their systems. This incident highlights the need for organizations to regularly update their software and apply security patches to defend against such attacks. Users of HPE OneView should prioritize checking for updates and implementing any recommended security measures to mitigate the risk of exploitation.

Impact: HPE OneView management software
Remediation: Organizations should check for updates and apply any available patches for HPE OneView to address this vulnerability.
Read Original

The jsPDF library, widely used for generating PDF documents in JavaScript applications, has a critical vulnerability that allows attackers to access sensitive data from a user's local filesystem. This flaw enables malicious actors to embed local files into generated PDFs, potentially leading to data breaches. Developers using jsPDF in their applications should be particularly vigilant, as this could affect any application relying on this library for PDF generation. The implications are serious, as sensitive information could be easily extracted without user consent. Users of applications built with jsPDF need to be aware of this risk and ensure that they update to the latest version as soon as a fix is available.

Impact: jsPDF library
Remediation: Update to the latest version of jsPDF once a patch is available.
Read Original

Veeam Backup & Replication has recently patched four vulnerabilities that could allow attackers to execute arbitrary code. These flaws affect users of the Veeam Backup & Replication software, which is widely used for data backup and recovery. If exploited, these vulnerabilities could lead to unauthorized access or manipulation of backup data, posing significant risks to data integrity and security. Users are strongly encouraged to update to the latest version of the software to close these security gaps and protect their systems from potential attacks. Keeping software up to date is crucial for maintaining a secure environment, especially for applications that handle sensitive data.

Impact: Veeam Backup & Replication
Remediation: Users should update to the latest version of Veeam Backup & Replication to apply the patches addressing these vulnerabilities.
Read Original

Veeam has issued security updates to address several vulnerabilities in its Backup & Replication software, including a significant remote code execution (RCE) flaw. This critical vulnerability could allow attackers to gain control over backup servers, posing a serious risk to organizations relying on this software for data protection. The flaws affect various versions of the Backup & Replication software, potentially exposing many users to exploitation if they do not update promptly. This situation is concerning as backup servers are vital for data recovery and integrity, and any compromise could lead to severe operational disruptions. Users are urged to apply the latest patches to safeguard their systems.

Impact: Veeam Backup & Replication software (specific versions not specified)
Remediation: Users should apply the latest security updates released by Veeam to mitigate the vulnerabilities.
Read Original

A serious vulnerability has been found in n8n, an open-source workflow automation platform, which could allow authenticated users to run arbitrary system commands on the server. This vulnerability, identified as CVE-2025-68668, has a high severity score of 9.9 according to the CVSS system, indicating a significant risk. It stems from a failure in the protection mechanisms that should keep the system secure. Users of n8n should be particularly concerned as this issue could lead to unauthorized control over their systems. The affected versions include all versions prior to the patch that addresses this vulnerability, making it crucial for users to update their installations promptly to prevent potential exploitation.

Impact: n8n (all versions prior to patch)
Remediation: Users are urged to update to the latest version of n8n to mitigate this vulnerability. Specific patch details were not provided in the article, but users should ensure they are running the most recent version to safeguard against this issue.
Read Original
ShinyHunters Claim Breach of US Cybersecurity Firm Resecurity (Updated)

Hackread – Cybersecurity News, Data Breaches, AI, and More

The hacking group known as ShinyHunters claims to have breached Resecurity, a US cybersecurity firm. They reportedly accessed sensitive data, although specific details about the type of information compromised have not been disclosed yet. Resecurity has acknowledged the incident and provided an update, although it remains unclear how many users or entities may be affected by this breach. This incident raises concerns about the security measures in place at cybersecurity firms themselves, as they are expected to be leaders in protecting sensitive data. The implications of such a breach could significantly undermine trust in the industry.

Impact: Resecurity's data and potentially client information
Remediation: N/A
Read Original
PreviousPage 3 of 6Next