Articles tagged "Vulnerability"

Found 331 articles

Step Finance reported a significant security breach resulting in the theft of $40 million worth of cryptocurrency. The incident occurred after hackers compromised the devices of several executives within the company. This breach raises concerns about the security of sensitive information and the potential vulnerability of key personnel in organizations handling digital assets. The theft not only affects Step Finance but also highlights the risks associated with managing cryptocurrencies, especially in terms of device security. As digital assets continue to grow in popularity, companies must prioritize securing their executives' devices to prevent future breaches.

Impact: Step Finance digital assets
Remediation: Companies should enhance device security protocols, including multi-factor authentication and regular security training for executives.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a serious vulnerability in SolarWinds Web Help Desk that is currently being exploited in active attacks. This flaw poses a risk to federal agencies, which have been instructed to apply necessary patches within three days to mitigate potential damage. The urgency of the situation underscores the importance of maintaining up-to-date systems, especially for organizations that rely on SolarWinds products. If left unaddressed, this vulnerability could lead to unauthorized access and compromise sensitive data, affecting not just government agencies but potentially their partners and clients as well. The situation is a reminder for all users of SolarWinds software to remain vigilant and ensure their systems are secure.

Impact: SolarWinds Web Help Desk
Remediation: Federal agencies are required to patch their systems within three days. Specific patch numbers or versions are not mentioned.
Read Original

CrossCurve, a decentralized finance platform, recently lost $3 million due to an exploit in its smart contract. Attackers took advantage of a vulnerability in the ReceiverAxelar contract, which was missing an essential validation check. This flaw allowed them to manipulate transactions undetected, leading to significant financial loss. The incident raises concerns about the security of smart contracts within the DeFi space, where similar vulnerabilities can have widespread implications for users and investors. As decentralized finance continues to grow, ensuring the security of such contracts is crucial to maintaining trust in these platforms.

Impact: CrossCurve ReceiverAxelar contract
Remediation: Conduct a thorough review and audit of smart contracts, implement additional validation checks, and possibly halt affected contracts until they are secured.
Read Original

A serious SQL injection vulnerability has been identified in the Quiz and Survey Master plugin, affecting approximately 40,000 WordPress sites. This flaw allows attackers to manipulate the database and potentially access sensitive information. Users of the affected plugin need to take immediate action to secure their sites to prevent unauthorized access and data breaches. Website owners are urged to update the plugin to the latest version as soon as possible to mitigate these risks. The discovery of this vulnerability serves as a reminder for all WordPress site administrators to regularly monitor and update their plugins to ensure their sites remain secure.

Impact: Quiz and Survey Master plugin for WordPress
Remediation: Update the Quiz and Survey Master plugin to the latest version.
Read Original

Hackers have been exploiting a serious vulnerability in the React Native CLI, identified as CVE-2025-11953, to execute remote commands and deploy stealthy Rust-based malware. This flaw arises from the React Native CLI's Metro server, which, by default, binds to external interfaces, making it susceptible to unauthorized access. This exploitation occurred weeks before the vulnerability was publicly disclosed, indicating that attackers are actively targeting this weakness. Users of React Native should be particularly vigilant, as the impact could extend to various applications built on this framework. Prompt action is necessary to secure affected systems and prevent further malicious activities.

Impact: React Native CLI, Metro server
Remediation: Users should immediately restrict access to the Metro server by modifying configuration settings to bind only to local interfaces. Additionally, they should monitor their systems for any signs of unauthorized access or malware installation. Regular updates and patches from React Native should be applied as they become available.
Read Original

A newly discovered vulnerability in React Native has been exploited in the wild, allowing attackers to disable security protections and deliver malware to affected devices. This flaw, which was previously thought to be a theoretical risk, has now raised alarms among developers and users of applications built with React Native. The impact of this vulnerability can be significant, as it compromises the integrity and security of applications, potentially affecting millions of users. Developers are urged to take immediate action to secure their applications and protect user data from malicious exploitation.

Impact: React Native applications, including those developed by various companies using this framework.
Remediation: Developers should apply security patches provided by React Native, review their application code for vulnerabilities, and enhance security measures to prevent unauthorized access. Regularly updating to the latest versions of React Native is also advised.
Read Original

A serious security vulnerability, identified as CVE-2025-11953 and nicknamed Metro4Shell, has been discovered in the Metro Development Server, which is part of the '@react-native-community/cli' npm package. This flaw, rated 9.8 on the CVSS scale, allows remote attackers to execute arbitrary code without authentication. Researchers from VulnCheck first detected active exploitation of this vulnerability on December 21, 2025. This poses a significant risk for developers and organizations using this package, as it could lead to unauthorized control over their systems. Users of the affected npm package need to take immediate action to protect their applications.

Impact: Metro Development Server in the '@react-native-community/cli' npm package.
Remediation: Developers should update their '@react-native-community/cli' package to the latest version to mitigate the vulnerability. They should also review their server configurations and implement security best practices to limit exposure to such attacks.
Read Original

A vulnerability has been discovered in OpenClaw, also known as Moltbot and Clawdbot, which allows attackers to execute remote code with just one click. This flaw poses a significant risk as it could enable hackers to take control of the AI assistant, potentially compromising user data and system integrity. The issue affects users of OpenClaw across various platforms, raising concerns about the security of AI tools that are increasingly integrated into everyday applications. It's essential for users and organizations to be aware of this vulnerability and take necessary precautions to protect their systems. The situation underscores the need for vigilance in managing software vulnerabilities, particularly in AI technologies that handle sensitive information.

Impact: OpenClaw, Moltbot, Clawdbot
Remediation: Users should apply any available patches or updates for OpenClaw and consider disabling the AI assistant until a fix is confirmed.
Read Original

Ukraine's Computer Emergency Response Team (CERT) has reported that Russian hackers are taking advantage of a newly patched vulnerability in Microsoft Office, identified as CVE-2026-21509. This flaw affects multiple versions of the software, which could leave users open to various cyberattacks. The exploitation of this vulnerability is concerning, especially as Microsoft Office is widely used in both personal and professional settings. Users and organizations are urged to ensure that their systems are updated with the latest security patches to mitigate the risk of being targeted. The situation underscores the need for vigilance in maintaining software security, especially with ongoing geopolitical tensions.

Impact: Microsoft Office (multiple versions)
Remediation: Users should apply the latest updates and patches provided by Microsoft for their respective versions of Office. Regularly check for updates to ensure protection against this vulnerability.
Read Original

A new wave of automated data extortion attacks is targeting exposed MongoDB instances. Cybercriminals are scanning for these unsecured databases and demanding low ransoms from their owners to restore access to the data. This trend raises concerns for businesses and individuals who may not have secured their databases properly, leaving them vulnerable to these attacks. The attackers exploit the lack of security measures in place, making it crucial for database administrators to implement proper configurations and safeguards. Without these protections, organizations risk losing important data and facing financial repercussions from ransom demands.

Impact: MongoDB instances
Remediation: Database owners should secure their MongoDB instances by implementing authentication, configuring firewalls, and regularly monitoring for unauthorized access. Specific steps include enabling access control and ensuring that instances are not publicly accessible without proper security measures.
Read Original

Last week, Microsoft addressed a serious vulnerability in its Office software, which was being actively exploited by attackers. This zero-day flaw could allow unauthorized access to user systems, putting sensitive information at risk. Users of Microsoft Office should ensure they install the latest updates to protect themselves from potential attacks. Additionally, Fortinet released patches for a flaw in its FortiCloud single sign-on (SSO) service, which could have allowed unauthorized access to user accounts. Organizations using FortiCloud should prioritize applying these updates to safeguard their systems from exploitation.

Impact: Microsoft Office, Fortinet FortiCloud
Remediation: Microsoft has released updates to fix the zero-day vulnerability in Office. Fortinet has issued patches for the FortiCloud SSO flaw.
Read Original

According to Government Technology, the number of recorded data breaches soared to 3,322 last year, marking the highest level ever documented. Alarmingly, about 70% of the breach notices lacked essential details about the incidents, leaving users and stakeholders in the dark about the nature of the breaches and the extent of the data compromised. This lack of transparency is concerning, as it prevents affected individuals from understanding their risks and taking necessary precautions. The surge in breaches indicates a growing vulnerability landscape, which raises questions about the effectiveness of current security measures across various sectors. As organizations continue to face increasing cyber threats, the need for clearer communication and accountability in breach disclosures becomes ever more critical.

Impact: N/A
Remediation: N/A
Read Original

A recent analysis has uncovered that approximately 175,000 hosts running Ollama, a platform for large language models (LLMs), are exposed to potential abuse. Among these, 23,000 hosts were found to be particularly active over a span of nearly a year, raising concerns about their security. This large number of exposed hosts could allow malicious actors to exploit LLMs for harmful purposes, such as generating misleading information or automating cyberattacks. The implications of this vulnerability are significant, as it puts both users and organizations at risk of being targeted by attackers leveraging these exposed systems. Experts urge immediate action to secure these hosts to prevent misuse.

Impact: Ollama hosts
Remediation: Organizations should secure their Ollama hosts and ensure proper configuration to prevent unauthorized access.
Read Original

SmarterTools has released patches for two vulnerabilities in its SmarterMail email software, one of which is classified as critical. This flaw, identified as CVE-2026-24423, has a CVSS score of 9.3 and could allow attackers to execute arbitrary code on systems running affected versions of SmarterMail. Users of SmarterMail versions prior to build 9511 are particularly at risk. It's crucial for organizations using this software to update immediately to protect against potential exploitation. The existence of such a high-severity vulnerability underscores the importance of regular software updates and vigilance in cybersecurity practices.

Impact: SmarterMail versions prior to build 9511
Remediation: Users should update to SmarterMail build 9511 or later to mitigate the risks associated with this vulnerability.
Read Original

Ivanti has revealed two serious vulnerabilities in its Endpoint Manager Mobile (EPMM) software, identified as CVE-2026-1281 and CVE-2026-1340. These vulnerabilities are currently being exploited in zero-day attacks, meaning attackers have already taken advantage of them before any fix was made available. Organizations using EPMM are at risk, as these flaws could allow unauthorized access to sensitive mobile device management functions. The situation is urgent, as the vulnerabilities are actively being exploited in the wild, which could lead to data breaches or unauthorized control over managed devices. Users and companies are advised to monitor for updates and take immediate action to secure their systems.

Impact: Ivanti Endpoint Manager Mobile (EPMM)
Remediation: Users should apply any available patches or updates from Ivanti as soon as they are released. In the meantime, organizations are advised to limit access to the EPMM software and monitor for unusual activity.
Read Original
PreviousPage 4 of 23Next