Articles tagged "Vulnerability"

Found 207 articles

Sax, a major US accounting firm, has revealed a data breach that has affected around 220,000 individuals. The breach was detected over a year ago, but the firm took considerable time to investigate the incident thoroughly. While specific details about how the breach occurred have not been disclosed, it raises significant concerns about the security of sensitive financial information. Affected individuals may need to monitor their accounts closely for any signs of unauthorized activity. This incident highlights the ongoing vulnerability of even well-established firms in protecting client data against cyber threats.

Impact: Personal data of approximately 220,000 individuals, including financial information.
Remediation: N/A
Read Original

On December 26, 2023, the Oltenia Energy Complex, Romania's largest coal-based energy producer, fell victim to a ransomware attack attributed to the Gentlemen ransomware group. The attack severely disrupted the company's IT infrastructure, impacting its ability to operate effectively. Although specific details about the extent of the damage or data breaches have not been disclosed, the incident raises concerns about the vulnerability of critical infrastructure to cyber threats. As energy providers are essential for public services, such attacks can significantly affect energy supply and operational stability. Authorities and cybersecurity experts are likely to investigate the incident further to understand its implications and improve defenses against similar attacks in the future.

Impact: Oltenia Energy Complex IT infrastructure
Remediation: N/A
Read Original
Actively Exploited

In 2025, several significant cybersecurity threats emerged, most notably the global attacks attributed to a group known as Salt Typhoon. These attacks targeted multiple sectors, causing widespread concern among businesses and government agencies alike. Additionally, the discovery of a vulnerability named React2Shell raised alarms due to its potential impact on systems using React framework, which is widely adopted in web development. Researchers emphasized that this vulnerability could allow attackers to execute arbitrary code, putting countless applications at risk. Organizations are urged to review their security measures and apply necessary updates to safeguard against these evolving threats.

Impact: React framework applications, various organizations targeted by Salt Typhoon
Remediation: Apply security patches for React framework; enhance monitoring and incident response plans for organizations targeted by Salt Typhoon.
Read Original

Fortinet has issued a warning about ongoing attacks that exploit an old vulnerability in its FortiOS software, identified as CVE-2020-12812. This flaw allows attackers to bypass two-factor authentication, which can significantly compromise the security of affected systems. Organizations using FortiOS should be particularly vigilant, as this vulnerability has resurfaced in active attacks. The potential for unauthorized access puts sensitive data at risk, making it critical for users to address this issue promptly. Cybersecurity teams are urged to review their systems and implement necessary updates to safeguard against these threats.

Impact: FortiOS versions that are vulnerable to CVE-2020-12812, particularly those configured with two-factor authentication.
Remediation: Users should apply the latest patches for FortiOS as provided by Fortinet. It is also recommended to review and strengthen two-factor authentication configurations and monitor system access logs for any suspicious activities.
Read Original
Critical 0day flaw Exposes 70k XSpeeder Devices as Vendor Ignores Alert

Hackread – Cybersecurity News, Data Breaches, AI, and More

Researchers have identified a critical unpatched vulnerability, designated CVE-2025-54322, in XSpeeder networking devices, which are widely used in industrial and branch environments. Approximately 70,000 devices are affected, leaving them open to potential exploitation. The flaw was discovered by AI agents, but the vendor has not addressed the alert, raising concerns about the security of these devices. This situation poses a significant risk, as attackers could exploit the vulnerability to gain unauthorized access or disrupt operations. Companies using XSpeeder devices should take immediate action to assess their security posture and implement necessary safeguards to protect their networks.

Impact: XSpeeder networking devices, approximately 70,000 units in industrial and branch settings.
Remediation: Companies should evaluate their XSpeeder devices for potential exposure and consider implementing network segmentation and monitoring to mitigate risks. Regularly updating security protocols and reviewing access controls can also help protect against exploitation until a patch is made available.
Read Original

Fortinet has issued a warning about a vulnerability in FortiOS that has been around for five years but is still being exploited by attackers. This flaw allows unauthorized users to bypass two-factor authentication (2FA) on FortiGate firewalls, which are widely used by organizations to secure their networks. The continued exploitation of this vulnerability poses a significant risk to companies relying on these firewalls, as it can lead to unauthorized access and potential data breaches. Users of FortiGate firewalls are urged to take immediate action to protect their systems by applying available security updates. This situation serves as a reminder of the importance of keeping software up to date and addressing known vulnerabilities promptly.

Impact: FortiGate firewalls running FortiOS
Remediation: Users should apply the latest security patches from Fortinet to mitigate this vulnerability.
Read Original

A newly discovered vulnerability in MongoDB, referred to as MongoBleed, poses a significant risk by allowing remote attackers to extract sensitive information from affected servers without authentication. This flaw has been exploited in real-world attacks, raising alarms among organizations that utilize MongoDB for their data management. The vulnerability's ability to leak data could expose sensitive customer information, business secrets, and other critical data. Companies using MongoDB should prioritize patching their servers to mitigate potential breaches. It's crucial for users to remain vigilant and ensure their systems are secure against this emerging threat.

Impact: MongoDB servers
Remediation: Organizations should apply security patches provided by MongoDB and follow best practices for securing their databases.
Read Original

A serious vulnerability in MongoDB, designated as CVE-2025-14847 and known as MongoBleed, is currently being exploited globally. This flaw, which has a CVSS score of 8.7, allows attackers to access sensitive data stored in the server's memory without needing authentication. Researchers have identified over 87,000 instances of MongoDB that could be affected by this issue. The potential for data leakage poses a significant risk to organizations using this database technology, making it critical for them to address the vulnerability promptly. Companies should assess their systems and implement necessary security measures to safeguard against this ongoing threat.

Impact: MongoDB servers, version not specified
Remediation: Organizations should immediately review their MongoDB configurations and apply any available security patches. It is advisable to implement access controls and monitor server activity for any unauthorized access attempts. Users should also consider upgrading to the latest version of MongoDB that addresses this vulnerability.
Read Original

A serious vulnerability known as MongoBleed (CVE-2025-14847) is currently being exploited, exposing over 80,000 MongoDB servers on the public internet. This flaw affects multiple versions of MongoDB, allowing attackers to potentially access sensitive information stored on these servers. The scale of the exposure raises significant security concerns, as many organizations may not be aware that their databases are at risk. Companies using affected MongoDB versions should take immediate action to secure their data and prevent unauthorized access. Failure to address this vulnerability could lead to severe data breaches and loss of sensitive information.

Impact: MongoDB versions affected include all versions with the MongoBleed vulnerability; specific versions are not detailed.
Remediation: Organizations should immediately update to the latest MongoDB version that addresses the MongoBleed vulnerability. Additionally, they should implement strict access controls and monitor their servers for any suspicious activity. Regularly auditing configurations and applying security patches as they become available is also recommended.
Read Original

The 2022 LastPass breach continues to pose risks, as attackers are still able to crack encrypted vault backups using weak master passwords. This vulnerability allows for potential cryptocurrency theft, with experts from TRM Labs warning that such thefts could occur as late as 2025. Users who stored sensitive information in LastPass and have not changed their passwords are particularly at risk. This incident emphasizes the importance of using strong, unique passwords and regularly updating them, especially after a security breach. As the situation evolves, individuals and businesses using LastPass should remain vigilant and consider additional security measures.

Impact: LastPass vault backups, cryptocurrency accounts
Remediation: Users should change their master passwords to strong, unique passwords and consider enabling two-factor authentication for added security.
Read Original

A serious vulnerability has been found in LangChain Core, a key Python package used for developing applications that utilize large language models (LLMs). This flaw, identified as CVE-2025-68664 and assigned a CVSS score of 9.3, could enable attackers to perform prompt injection attacks, which may lead to the theft of sensitive data and manipulation of LLM responses. Organizations using LangChain Core for their applications are at risk, as this vulnerability allows malicious actors to exploit the package to access confidential information. It's critical for developers and companies utilizing this software to take immediate action to secure their systems and protect user data from potential breaches.

Impact: LangChain Core (langchain-core), Python applications built on LangChain ecosystem
Remediation: Update LangChain Core to the latest version that addresses this vulnerability. Review and harden input handling to prevent prompt injection attacks.
Read Original

A serious vulnerability has been found in LangChain Core, a Python package that serves as a key part of the LangChain ecosystem. This flaw allows attackers to potentially steal sensitive information and manipulate responses from large language models through a method known as serialization injection. The issue raises significant concerns for developers and companies using LangChain, as it can compromise the integrity of applications relying on these models. Users of LangChain Core should take immediate precautions to safeguard their systems, especially given the potential for exploitation. The situation underscores the need for timely updates and vigilant security practices in software development.

Impact: LangChain Core (langchain-core)
Remediation: Developers are advised to apply security patches as they become available and review their implementations for potential vulnerabilities related to serialization.
Read Original

Fortinet has alerted users about the active exploitation of a five-year-old vulnerability in its FortiOS SSL VPN, identified as CVE-2020-12812. This flaw, which has a CVSS score of 5.2, involves improper authentication and is particularly dangerous under specific configurations. Researchers have recently observed this vulnerability being abused in real-world attacks, which means organizations using affected versions of FortiOS SSL VPN should take immediate action to secure their systems. The ongoing exploitation of such an outdated vulnerability underscores the need for companies to regularly update their security measures and ensure proper configuration to protect against potential attacks.

Impact: FortiOS SSL VPN versions affected by CVE-2020-12812.
Remediation: Fortinet recommends updating to the latest version of FortiOS SSL VPN to mitigate this vulnerability. Users should also review their configurations to ensure that they are not exposing themselves to exploitation of this flaw.
Read Original

Fortinet has reported that a five-year-old vulnerability in its FortiOS SSL VPN is being actively exploited. This flaw, identified as CVE-2020-12812, allows attackers to bypass two-factor authentication under specific configurations, enabling unauthorized access to systems. Organizations using affected versions of FortiOS SSL VPN should be particularly vigilant, as this vulnerability could lead to significant security breaches. The issue emphasizes the need for users to ensure their VPN configurations are secure and up-to-date. Fortinet's warning serves as a critical reminder of the importance of addressing known vulnerabilities, even those that have been around for several years.

Impact: FortiOS SSL VPN (specifically affected configurations), Fortinet products utilizing this version
Remediation: Users should apply the latest patches provided by Fortinet for FortiOS. Additionally, they should review and adjust their SSL VPN configurations to ensure that two-factor authentication is enforced correctly.
Read Original

On Monday, the French national postal service, La Poste, experienced a significant disruption due to a Distributed Denial of Service (DDoS) attack. The attack caused central computer systems to go offline, impacting operations across the postal service. Pro-Russian hacker groups have claimed responsibility for the incident, raising concerns about the motivations behind such attacks amid ongoing geopolitical tensions. This incident not only disrupts postal services but also highlights the vulnerability of critical infrastructure to cyber threats. As La Poste works to restore services, this event serves as a reminder of the increasing frequency and severity of cyberattacks targeting essential services.

Impact: La Poste's central computer systems
Remediation: N/A
Read Original
PreviousPage 5 of 14Next