A recent vulnerability identified as CVE-2025-32975 may have been exploited in attacks targeting the education sector. This flaw affects Critical Quest's KACE systems, which are commonly used for IT management and endpoint security. The potential exploitation raises concerns about the security of sensitive data within educational institutions. As attackers increasingly focus on this sector, it is crucial for organizations to assess their systems and ensure they are protected against such vulnerabilities. Institutions that use KACE products should be particularly vigilant and consider implementing protective measures immediately.
Articles tagged "Vulnerability"
Found 497 articles
SCM feed for Latest
A newly discovered vulnerability, identified as CVE-2026-33017, poses a serious risk by allowing unauthenticated attackers to run arbitrary Python code on vulnerable servers. This flaw was reportedly exploited within 20 hours of its disclosure, raising concerns among cybersecurity experts. Organizations that use systems affected by this vulnerability need to act swiftly to secure their environments. The ability for attackers to execute arbitrary code can lead to severe data breaches and system compromises, making it crucial for affected users to understand their risk and take appropriate measures. As of now, details on specific systems or versions impacted have not been disclosed, leaving many organizations potentially vulnerable.
SCM feed for Latest
Ubiquiti has released patches to address a critical vulnerability in its UniFi Network application, specifically affecting versions 10.1.85 and earlier. The vulnerability, tracked as CVE-2026-22557, poses significant risks to users who have not yet updated their software. This flaw could potentially allow attackers to exploit the system, compromising network security. Users of the affected versions are strongly advised to update to the latest version to safeguard their networks. The urgency of this patch highlights the ongoing need for regular software updates to protect against evolving threats.
Oracle has announced a critical vulnerability in its Fusion Middleware that allows attackers to execute arbitrary code without needing authentication. This flaw affects Oracle's Identity and Web Services Managers, particularly if they are exposed to the internet. The lack of authentication means that anyone can potentially exploit this vulnerability, making it especially dangerous for organizations that have these services publicly accessible. Companies using these products should take immediate action to secure their systems to prevent unauthorized access and potential data breaches. It's crucial for users to apply the necessary patches as soon as possible to mitigate the risks associated with this flaw.
Oracle has issued an emergency security update to address a serious vulnerability in its Identity Manager and Web Services Manager products, identified as CVE-2026-21992. This flaw allows attackers to execute remote code without needing any authentication, which poses a significant risk to organizations using these systems. The vulnerability could potentially be exploited to gain unauthorized access and control over sensitive information. Users of Oracle's Identity Manager and Web Services Manager should prioritize applying the update to protect their systems from potential attacks. This incident underscores the ongoing need for vigilance in software security, particularly with products that manage identity and access controls.
The Hacker News
Trivy, an open-source vulnerability scanner developed by Aqua Security, has been compromised for the second time in a month. This breach specifically targeted the GitHub Actions workflows 'aquasecurity/trivy-action' and 'aquasecurity/setup-trivy', which are commonly used for scanning Docker container images for vulnerabilities. Attackers hijacked 75 tags to deliver malware that aims to steal sensitive continuous integration and continuous delivery (CI/CD) secrets. This incident is particularly concerning as it exposes users relying on these tools to potential data breaches and security risks. Organizations using these GitHub Actions should take immediate action to secure their environments and monitor for any unauthorized access or data leaks.
Ubiquiti has disclosed a serious vulnerability in its UniFi Networking Application, which is used by customers to manage their networking devices. This flaw poses a risk of account takeover, potentially allowing attackers to gain unauthorized access to user accounts. As of now, the vulnerability hasn't been exploited publicly, which gives users a window to secure their systems. The issue affects a wide range of users who rely on the UniFi Networking Application for their networking needs. Given the severity of the flaw, it’s crucial for users to stay informed and take necessary precautions to protect their accounts.
The Hacker News
CVE-2026-33017A severe security vulnerability in Langflow, identified as CVE-2026-33017, has been actively exploited just 20 hours after being disclosed. This flaw, which has a CVSS score of 9.3, is due to missing authentication combined with a code injection issue that could allow attackers to execute arbitrary code remotely. Organizations using Langflow are at risk, as the fast exploitation of such vulnerabilities underscores the need for immediate action. Users and administrators should prioritize addressing this flaw to protect their systems from potential attacks. The rapid responses from malicious actors highlight the urgency for security teams to stay vigilant and proactive against new threats.
SecurityWeek
Navia experienced a significant data breach between late December 2025 and mid-January 2026, affecting approximately 2.7 million individuals. Hackers accessed sensitive personal and health plan information, raising serious concerns for those impacted. The breach not only compromises individual privacy but also poses risks of identity theft and fraud. As healthcare data is particularly valuable on the dark web, this incident highlights the ongoing vulnerability of health-related organizations to cyberattacks. Affected individuals may need to monitor their accounts and take steps to protect their personal information.
Infosecurity Magazine
Researchers at Sysdig have reported that hackers successfully exploited a significant vulnerability in Langflow, identified as a CVE, in under 20 hours. This rapid exploitation underscores the urgency for users and companies utilizing Langflow to act quickly. The vulnerability could allow attackers to gain unauthorized access or control, posing serious risks to data security. As the threat remains active, organizations relying on this software must prioritize patching and securing their systems to mitigate potential damage. The situation serves as a reminder of the importance of timely updates and vigilance in cybersecurity practices.
Help Net Security
CVE-2026-3564ConnectWise has addressed a significant vulnerability (CVE-2026-3564) in its ScreenConnect remote access platform, which is widely used by managed service providers and IT departments. This flaw allows attackers to potentially hijack remote sessions by misusing ASP.NET machine keys to create forged authentication tokens. The vulnerability arises from inadequate verification of cryptographic signatures, making it possible for hackers to exploit the issue remotely. Organizations that utilize ScreenConnect, whether in cloud-hosted or on-premise configurations, need to prioritize applying the available patches to safeguard their systems. Failure to address this vulnerability could lead to unauthorized access to sensitive information and operations.
SCM feed for Latest
The Interlock ransomware group has been exploiting a severe zero-day vulnerability in Cisco Secure Firewall Management Center software, identified as CVE-2026-20131, since January 26, prior to its public disclosure. This vulnerability allows for insecure deserialization, which can lead to unauthorized access and potential takeover of affected systems. Organizations using Cisco's Secure Firewall Management Center should be particularly vigilant, as the attacks have been ongoing for over a month, posing a significant risk to network security. The situation emphasizes the urgent need for timely security updates and monitoring to protect against such exploitation.
SCM feed for Latest
ConnectWise has issued a warning about a serious vulnerability in its ScreenConnect software. This flaw allows attackers to extract ASP.NET machine keys, which could lead to unauthorized access to user sessions. Organizations using ScreenConnect could be at risk, as this vulnerability enables attackers to bypass authentication controls. Users should be aware of the potential for misuse of their systems and take immediate action to protect their data. It is crucial for affected parties to stay updated on this issue and implement necessary safeguards to prevent exploitation.
Ubiquiti has addressed two vulnerabilities in its UniFi Network app, one of which is particularly serious and could allow attackers to take control of user accounts. This software is commonly used to manage various networking devices such as access points, switches, and gateways. The critical flaw poses a significant risk as it could lead to unauthorized access to sensitive user information and network settings. Users of UniFi products are urged to apply the latest patches to protect their systems. This incident serves as a reminder of the importance of keeping software up-to-date to mitigate potential security risks.
BleepingComputer
Hackers associated with APT28, a group believed to be linked to the Russian military intelligence, are exploiting a vulnerability in the Zimbra Collaboration Suite (ZCS) to target Ukrainian government entities. This attack is part of ongoing cyber operations against Ukraine amid the broader conflict with Russia. The specific flaw being exploited allows attackers to gain unauthorized access, which could lead to significant data breaches or disruptions in government operations. The situation is critical, as it not only affects the security of Ukrainian governmental systems but also reflects the increasing use of cyber tactics in geopolitical conflicts. Ukrainian officials and cybersecurity experts are urging immediate action to patch the vulnerabilities and safeguard sensitive information.