Articles tagged "Exploit"

Found 181 articles

Cisco has addressed a serious flaw in its Secure Email products, which was exploited by a China-linked hacking group known as UAT-9686. The vulnerability, tracked as CVE-2025-20393, has a maximum severity score of 10.0 and affects the Secure Email Gateway and Email and Web Manager. Attackers were able to exploit this flaw as a zero-day, meaning it was actively used in attacks before a patch was made available. It's crucial for users of these products to apply the latest updates to protect their systems from potential exploitation. This incident highlights the ongoing risks posed by advanced persistent threat groups targeting widely used software.

Impact: Cisco Secure Email Gateway, Cisco Email and Web Manager
Remediation: Cisco has released patches for the affected Secure Email products. Users should ensure their systems are updated to the latest version to mitigate the vulnerability.
Read Original

Cisco has addressed a serious vulnerability in its AsyncOS software that has been exploited since November 2025. This zero-day flaw specifically affects Secure Email Gateway (SEG) appliances, which are used by organizations to filter and protect email traffic. Attackers have been able to exploit this weakness, putting sensitive data at risk and potentially compromising email communications for users relying on these appliances. The timely patch is crucial for organizations to secure their email systems and prevent further exploitation. Companies using these SEG appliances should prioritize applying the update to safeguard against these attacks.

Impact: Cisco Secure Email Gateway (SEG) appliances running AsyncOS.
Remediation: Cisco has released a patch for AsyncOS to fix the zero-day vulnerability. Users should immediately update their SEG appliances to the latest version provided by Cisco to mitigate the risk of exploitation.
Read Original

Security researcher Eaton Zveare identified five serious vulnerabilities in Bluspark's Bluvoyix platform, which is used in shipping and supply chain management. Among these flaws were the use of plaintext passwords and an unauthenticated API, both of which could potentially allow unauthorized access to sensitive data. This incident raises concerns for companies relying on Bluvoyix, as attackers could exploit these weaknesses to gain access to critical operational information. Bluspark has since released patches to address these vulnerabilities, but the exposure of such significant flaws underscores the need for robust security practices in software development. Users of the platform should ensure they update to the latest version to mitigate these risks.

Impact: Bluspark's Bluvoyix shipping and supply chain platform
Remediation: Patches have been released to address the vulnerabilities; users should update to the latest version.
Read Original

A recent report from Cyble reveals that hacktivists and cybercriminals are increasingly targeting industrial systems, looking to exploit vulnerabilities within these environments. This uptick in attacks poses significant risks to companies operating in sectors such as manufacturing, energy, and utilities, potentially leading to disruptions in operations and financial losses. The report emphasizes the critical need for these organizations to enhance their cybersecurity measures and patch known vulnerabilities to safeguard their systems. As attackers become more sophisticated, the potential for severe consequences, including data breaches and operational downtime, grows. Companies must prioritize security protocols to protect their infrastructure from these escalating threats.

Impact: Industrial control systems, manufacturing systems, energy sector systems
Remediation: Companies should conduct vulnerability assessments, apply security patches, and implement robust monitoring solutions.
Read Original

A serious vulnerability, identified as CVE-2025-64155, has been discovered in Fortinet’s FortiSIEM security platform, allowing unauthenticated remote attackers to execute unauthorized code. This flaw specifically affects the phMonitor service, which is crucial for the operation of FortiSIEM. The release of proof-of-concept (PoC) exploit code has heightened concerns, urging organizations using this software to apply patches immediately. If not addressed, this vulnerability could lead to significant security risks, as attackers could manipulate the system remotely. Organizations should prioritize patching their FortiSIEM deployments to safeguard against potential exploitation.

Impact: Fortinet FortiSIEM security platform
Remediation: Organizations should immediately apply patches provided by Fortinet for FortiSIEM to mitigate the vulnerability. Specific patch numbers or versions were not mentioned in the article, so users should check Fortinet's official site for the latest updates.
Read Original
Actively Exploited

A website associated with a data breach at the Department of Homeland Security is currently facing a distributed denial-of-service (DDoS) attack, reportedly orchestrated through Russian servers. This attack is aimed at a site linked to the leaked personal information of ICE agents, putting these individuals at risk of harassment or further exposure. The breach not only affects the privacy and security of those named but also raises concerns about the overall security of sensitive government data. The incident highlights ongoing tensions and the potential for cyber warfare, as attackers exploit vulnerabilities for political or social motives. As investigations continue, the implications for national security and the safety of federal agents remain significant.

Impact: Department of Homeland Security, ICE agents, associated data breach website
Remediation: N/A
Read Original

Palo Alto Networks has released a patch for a serious vulnerability that could enable attackers to conduct denial-of-service (DoS) attacks, effectively disabling firewall protections. This flaw allows unauthenticated individuals to exploit the vulnerability, raising concerns for organizations relying on Palo Alto's security products. The ability to disable firewalls poses significant risks, as it could lead to unauthorized access and data breaches. Companies using affected products are urged to apply the patch immediately to safeguard their networks. This incident serves as a reminder of the ongoing challenges in maintaining cybersecurity defenses against evolving threats.

Impact: Palo Alto Networks firewalls and related security products
Remediation: Patch the vulnerability using the update provided by Palo Alto Networks. Specific patch numbers or versions not mentioned.
Read Original

Palo Alto Networks has addressed a serious vulnerability in its GlobalProtect Gateway and Portal software, identified as CVE-2026-0227, which carries a CVSS score of 7.7. This flaw allows for a denial-of-service (DoS) condition that can crash firewalls without requiring user authentication. A proof-of-concept exploit for this vulnerability is already available, raising concerns about its potential impact on organizations using these systems. Companies utilizing GlobalProtect PAN-OS software should promptly apply the security updates released by Palo Alto to safeguard their networks. Failure to address this vulnerability could leave systems open to disruptions, affecting overall network availability.

Impact: GlobalProtect Gateway, GlobalProtect Portal, PAN-OS software from Palo Alto Networks
Remediation: Palo Alto Networks has released security updates to address CVE-2026-0227. Users should apply these updates immediately to mitigate the risk of exploitation.
Read Original

Recent reports confirm that internal source code and documentation from Target Corporation has been exposed on the public software development platform Gitea. Current and former employees verified the authenticity of the leaked materials, raising concerns about potential security vulnerabilities and misuse of sensitive information. The exposure of this source code could allow malicious actors to exploit weaknesses in Target's systems, potentially leading to data breaches or other security incidents. This situation not only affects Target but also raises alarms for customers and partners who rely on the company for secure transactions. It highlights the ongoing risks associated with software development platforms and the importance of securing proprietary code.

Impact: Target Corporation internal source code and documentation
Remediation: N/A
Read Original

A serious vulnerability has been discovered in Fortinet's Security Information and Event Management (SIEM) solution, FortiSIEM, which allows remote, unauthenticated attackers to execute arbitrary commands. This flaw, classified as a command injection vulnerability, poses a significant risk as it can be exploited without needing any prior access. Researchers have released technical details and exploit code, raising concerns about the potential for widespread attacks. Companies using FortiSIEM should take immediate action to secure their systems, as the implications of this vulnerability could lead to unauthorized access and data breaches. It's crucial for users to stay informed and apply any necessary patches or updates as they become available.

Impact: FortiSIEM
Remediation: Organizations should implement available patches and updates for FortiSIEM as soon as possible to mitigate the risk of exploitation.
Read Original

Hackers are using fake PayPal notifications to trick users into providing their login credentials. These phishing attacks are designed to exploit remote monitoring and management (RMM) tools, which can give attackers remote access to compromised systems. Users who fall for these scams may unknowingly grant hackers the ability to control their devices, posing a significant security risk. This method of attack affects anyone who uses PayPal, especially those who may not be vigilant about verifying the authenticity of such alerts. It's crucial for users to be cautious about unsolicited emails and messages that request personal information or direct them to unfamiliar websites.

Impact: PayPal users, remote monitoring and management tools
Remediation: Users should verify the source of emails before clicking links, enable two-factor authentication on their accounts, and regularly update passwords.
Read Original

Fortinet has addressed six security flaws, two of which are critical vulnerabilities affecting its FortiFone and FortiSIEM products. These vulnerabilities could potentially allow attackers to exploit the systems without needing any authentication, which raises significant security concerns. Specifically, the flaws could lead to unauthorized access to configuration data or enable the execution of malicious code. Users of these products should prioritize applying the patches provided by Fortinet to safeguard their systems. Given the nature of these vulnerabilities, organizations using FortiFone and FortiSIEM need to act quickly to mitigate any potential risks.

Impact: FortiFone, FortiSIEM
Remediation: Fortinet has released patches to fix the vulnerabilities. Users are advised to apply these patches as soon as possible to prevent potential exploitation.
Read Original

A hacker has claimed to have fully breached Max Messenger, a messaging app popular in Russia, and is threatening to leak sensitive user data and backend systems unless their demands are met. This situation raises alarms for users of the app, as it could expose personal information and compromise the security of communications on the platform. The hacker's claims have not yet been verified, and the company has not publicly responded to the threat. If the breach is legitimate, it could have serious implications for user privacy and trust in the app. The incident underscores the ongoing risks associated with messaging platforms and the potential for cybercriminals to exploit vulnerabilities.

Impact: Max Messenger (Russia)
Remediation: N/A
Read Original
How Cybercrime Markets Launder Breach Proceeds and What Security Teams Miss

Hackread – Cybersecurity News, Data Breaches, AI, and More

The article examines how cybercriminals exploit markets to convert stolen data into laundered money, primarily using dollar-pegged assets like stablecoins, mixers, and cryptocurrency exchanges. Researchers emphasize the importance of monitoring the price of Bitcoin against Tether (BTC/USDT) and the flow of stablecoins to help security, fraud, and anti-money laundering (AML) teams combat these activities. By understanding these financial movements, organizations can better track illicit transactions and potentially recover lost assets. This issue is particularly relevant as more companies face the fallout from data breaches and the rising sophistication of cybercrime. As a result, security teams are urged to adapt their strategies to include financial monitoring in their defense mechanisms.

Impact: N/A
Remediation: Organizations should implement financial monitoring tools and strategies to track cryptocurrency transactions, especially focusing on stablecoin flows and the BTC/USDT price.
Read Original

Node.js has issued urgent updates to address a serious vulnerability that affects nearly all production applications using the platform. The flaw, related to the async_hooks module, can lead to a stack overflow, resulting in a denial-of-service (DoS) condition. This means that if attackers exploit this vulnerability, they could crash servers running affected applications, disrupting services. Developers and companies using Node.js should prioritize applying these patches to maintain service availability and prevent potential outages. The vulnerability is especially concerning because it touches on core functionality that many frameworks rely on for stability.

Impact: Node.js applications, specifically those using async_hooks
Remediation: Node.js has released updates; specific version numbers or patch details are not mentioned.
Read Original
PreviousPage 6 of 13Next