Articles tagged "Exploit"

Found 181 articles

A new strain of ransomware known as Osiris has been identified, targeting a major food service franchisee operator in Southeast Asia in November 2025. The attackers utilized a malicious driver called POORTRY in a technique known as bring your own vulnerable driver (BYOVD), which helps them disable security measures on the victim's systems. This method allows the ransomware to operate without detection, increasing the risk of data theft and operational disruption. The emergence of Osiris is concerning as it reflects a growing trend in ransomware attacks that exploit existing drivers to bypass security protocols. Organizations, especially those in sensitive sectors like food services, need to be vigilant and ensure their security measures can defend against such sophisticated techniques.

Impact: Osiris ransomware, POORTRY driver
Remediation: Organizations should implement strict monitoring of driver installations, apply security patches promptly, and enhance endpoint protection to detect and prevent the exploitation of vulnerable drivers.
Read Original

During the second day of the Pwn2Own Automotive 2026 competition, hackers successfully exploited 29 zero-day vulnerabilities, earning a total of $439,250 in rewards. This event highlights the ongoing security challenges in the automotive sector, as researchers and ethical hackers test the resilience of vehicles against cyber threats. The vulnerabilities targeted various systems within automotive technology, but specific details about the affected models or manufacturers were not provided. This incident is significant because it showcases the ease with which skilled attackers can uncover critical flaws, raising concerns about the safety and security of connected vehicles. As the automotive industry increasingly adopts smart technology, it must prioritize robust security measures to protect against such vulnerabilities.

Impact: Automotive systems and technologies, not specified
Remediation: N/A
Read Original

Atlassian, GitLab, and Zoom have recently released security patches addressing more than two dozen vulnerabilities, some of which are classified as critical or high-severity. These updates aim to protect users from potential attacks that could exploit these weaknesses. Affected products include popular collaboration tools and development platforms, which are widely used in various organizations. It's crucial for users of these applications to apply the patches promptly to safeguard their systems against possible exploitation. The vulnerabilities could allow unauthorized access or other malicious activities if not addressed, making timely updates essential for maintaining security.

Impact: Atlassian products, GitLab, Zoom
Remediation: Users should apply the latest security patches provided by Atlassian, GitLab, and Zoom.
Read Original

Cisco has addressed a serious security flaw in its Unified Communications and Webex Calling platforms, identified as CVE-2026-20045. This vulnerability allows attackers to execute arbitrary commands remotely without authentication, posing a significant risk to users. The flaw has been actively exploited in the wild, which raises concerns for organizations relying on these communication tools. With a CVSS score of 8.2, it is classified as critical, emphasizing the urgency for users to apply the available patches. Companies utilizing Cisco's services should prioritize updating their systems to mitigate potential attacks.

Impact: Cisco Unified Communications, Cisco Webex Calling
Remediation: Cisco has released patches to address the vulnerability. Users should update their systems to the latest versions as soon as possible to protect against exploitation.
Read Original

Phishing attacks are becoming more sophisticated and harder to detect, focusing on exploiting human emotions and timing rather than just careless users. Researchers from Flare have revealed that modern phishing tactics have evolved into industrialized operations, making them scalable and more challenging for individuals to recognize. This shift highlights the need for users to be more vigilant and educated about potential scams. Phishing can lead to severe consequences, including financial loss and data breaches, affecting both individuals and organizations. As these tactics grow in complexity, it's crucial for everyone to understand the risks and recognize the signs of phishing attempts.

Impact: N/A
Remediation: Users should stay informed about phishing tactics, verify suspicious communications, and use security features like two-factor authentication.
Read Original

Hackers are taking advantage of poorly configured web applications that are designed for security training and testing, such as DVWA, OWASP Juice Shop, Hackazon, and bWAPP. These applications are being used as gateways to access the cloud environments of various Fortune 500 companies and security vendors. The attackers exploit these misconfigurations to infiltrate systems that should ideally serve as safe environments for testing security measures. This situation raises serious concerns for companies that rely on these tools for internal security practices, as it exposes them to potential data breaches and unauthorized access. Organizations need to ensure that their security testing applications are correctly configured to prevent exploitation by malicious actors.

Impact: DVWA, OWASP Juice Shop, Hackazon, bWAPP, Fortune 500 companies, security vendors
Remediation: Companies should review and properly configure their web applications used for security testing to close any vulnerabilities that could be exploited.
Read Original

North Korean hackers are targeting macOS developers by luring them to malicious projects on GitHub and GitLab that are opened with Visual Studio Code. The attackers use these repositories to trick users into executing harmful code, potentially compromising their systems. This tactic poses a significant risk to developers who may unknowingly download and run these malicious projects, which could lead to data breaches or further exploitation of their systems. As these attacks exploit popular development tools, developers need to be vigilant about the sources of the projects they access. This incident emphasizes the ongoing threat posed by state-sponsored hackers and the need for heightened awareness in the software development community.

Impact: macOS systems, Visual Studio Code, GitHub, GitLab
Remediation: Developers should verify the integrity and source of any repositories before downloading or executing code. Keeping software updated and utilizing security tools to scan for malicious code are also recommended.
Read Original

TP-Link has addressed a serious vulnerability in its VIGI C and VIGI InSight camera models that allowed remote access to surveillance systems. This flaw, identified as CVE-2026-0629, has a CVSS score of 8.7, indicating high severity. Over 32 models were affected, with more than 2,500 devices exposed to the internet and potentially at risk of being hacked. Attackers could exploit this vulnerability to bypass local network restrictions, putting users' security and privacy in jeopardy. The fix for this issue is crucial for ensuring the safety of surveillance operations for both businesses and individuals who rely on these cameras.

Impact: TP-Link VIGI C and VIGI InSight camera models (over 32 models identified), 2,500 internet-exposed devices.
Remediation: Users should update their camera firmware to the latest version provided by TP-Link to close the vulnerability. Additionally, it is advisable to regularly check for firmware updates and ensure that devices are not unnecessarily exposed to the internet.
Read Original
Google Gemini AI Tricked Into Leaking Calendar Data via Meeting Invites

Hackread – Cybersecurity News, Data Breaches, AI, and More

Researchers at Miggo Security discovered a vulnerability in Google Gemini that allows attackers to exploit calendar invites to extract private user data. This flaw enables a silent attack method, where the malicious actor can trick the AI into leaking sensitive information without raising alarms. The implications of this vulnerability are significant, as it could compromise users' personal schedules and confidential details stored within their calendar apps. Google users relying on Gemini for scheduling and other functions may be particularly at risk. It's crucial for users and organizations to be aware of this issue and take necessary precautions to safeguard their data.

Impact: Google Gemini, Google Calendar
Remediation: Users should review their calendar sharing settings and be cautious when accepting invites from unknown sources.
Read Original

A new information-stealing malware called 'SolyxImmortal' has emerged, which utilizes legitimate APIs and libraries to gather sensitive data. The malware sends this stolen information to Discord webhooks, making detection challenging. This type of attack can affect anyone who unwittingly downloads the malware, potentially compromising personal and financial information. As cybercriminals increasingly exploit trusted platforms and tools, users need to be vigilant about the software they install and the permissions they grant. This incident serves as a reminder of the evolving tactics used by attackers to bypass security measures.

Impact: N/A
Remediation: Users should avoid downloading unverified software and regularly monitor their systems for unusual activity. Employing security software that scans for malware and suspicious behavior can also help mitigate risks.
Read Original

Ingram Micro, a major player in the information technology sector, experienced a ransomware attack in July 2025 that compromised the personal data of over 42,000 individuals. The breach raises serious concerns about data security and the potential misuse of sensitive information, as attackers often seek to exploit such data for financial gain or identity theft. The scale of the incident highlights the ongoing risks that companies face from cyber threats, particularly in the IT sector, which is often targeted due to its critical role in global infrastructure. Affected individuals should remain vigilant for signs of identity theft and consider monitoring their accounts for unusual activity. Organizations must strengthen their cybersecurity measures to prevent similar incidents in the future.

Impact: Personal data of over 42,000 individuals
Remediation: N/A
Read Original

CyberArk has reported that it successfully exploited a vulnerability in the StealC infostealer malware to gather intelligence. This malware is known for stealing sensitive information from infected systems, which can include login credentials, financial data, and personal information. By exploiting the flaw, researchers were able to collect evidence that can help understand how the malware operates and how it might be mitigated. This incident underscores the ongoing challenges posed by infostealers and the need for organizations to remain vigilant against such threats. Users and companies should ensure their systems are updated and monitor for signs of compromise, as infostealers like StealC can have serious implications for data security.

Impact: StealC infostealer malware
Remediation: Users should update their systems and implement security measures to monitor for infections.
Read Original

A recent study by Palo Alto Networks warns that the upcoming Milan Cortina 2026 Winter Olympic Games could attract cyber attackers looking to exploit the event's extensive digital infrastructure. With the Olympics featuring increased network traffic, new systems, and temporary partnerships, the risk of cyber incidents rises significantly. Attackers are likely to target various components of the event's digital ecosystem, including ticketing platforms and telecommunications infrastructure. This situation poses a threat not only to the event organizers but also to attendees and stakeholders who rely on these digital services. As the event approaches, it’s crucial for companies involved in the Olympics to enhance their cybersecurity measures to mitigate potential attacks.

Impact: Ticketing platforms, telecommunications infrastructure, digital services used during the Olympics
Remediation: Companies involved should enhance cybersecurity measures and prepare for potential attacks as the event approaches.
Read Original

A recent report from Infosecurity Magazine indicates that industrial technology environments are facing a significant surge in cyberattacks. The number of incidents has doubled, particularly targeting vulnerabilities in industrial control systems. This increase poses serious risks for industries reliant on these systems, as attackers may exploit weaknesses to disrupt operations or compromise sensitive data. Companies operating in sectors such as manufacturing, energy, and transportation should be particularly vigilant, as the implications of these attacks could lead to operational downtime and financial losses. The trend highlights the urgency for organizations to enhance their cybersecurity measures to protect against evolving threats.

Impact: Industrial control systems, manufacturing systems, energy sector technologies, transportation systems
Remediation: Organizations should implement stronger security protocols, conduct regular vulnerability assessments, and ensure timely updates to industrial control systems.
Read Original

Researchers discovered a cross-site scripting (XSS) vulnerability in the web-based control panel of the StealC info-stealing malware. This flaw allowed them to monitor the malware operators' active sessions and collect data on their hardware setups. StealC is designed to steal sensitive information from users, which means this incident not only exposes the attackers but also raises concerns about the ongoing effectiveness of such malware. Understanding these vulnerabilities can help cybersecurity experts develop better defenses against similar threats. The incident serves as a reminder that even sophisticated malware can have weaknesses that researchers can exploit to gain insights into cybercriminal operations.

Impact: StealC info-stealing malware control panel
Remediation: Implement proper input validation and sanitization to mitigate XSS vulnerabilities; regularly update security protocols for web applications.
Read Original
PreviousPage 5 of 13Next