Articles tagged "Update"

Found 141 articles

JumpCloud Remote Assist Flaw Lets Users Gain Full Control of Company Devices

Hackread – Cybersecurity News, Data Breaches, AI, and More

A serious vulnerability identified as CVE-2025-34352 affects the JumpCloud Remote Assist for Windows agent, allowing local users to gain full SYSTEM privileges on company devices. Discovered by XM Cyber, this flaw poses a significant risk to organizations using the software, as it could enable unauthorized access and control over sensitive company systems. Businesses are strongly urged to update their JumpCloud software to version 0.317.0 or later to mitigate this high-severity security issue. Failure to address this vulnerability could lead to severe operational disruptions and data breaches. Immediate action is crucial to ensure the safety and integrity of company devices and networks.

Impact: JumpCloud Remote Assist for Windows, versions prior to 0.317.0
Remediation: Update to JumpCloud Remote Assist version 0.317.0 or later
Read Original

Apple has released security updates to address two vulnerabilities in WebKit, identified as CVE-2025-14174 and CVE-2025-43529, which are currently being exploited in the wild. The first vulnerability, CVE-2025-14174, was previously patched by Google for its Chrome desktop browser, but details were limited at that time. This flaw allows for out-of-bounds memory access, potentially enabling attackers to execute arbitrary code. Users of Apple devices, particularly those running Safari or any applications reliant on WebKit, should prioritize updating their systems to safeguard against these vulnerabilities. Ignoring these updates could leave devices exposed to active exploitation.

Impact: Affected products include Apple devices running Safari and any applications using WebKit. Specific versions or models are not detailed, but all users of Apple's operating systems should be cautious.
Remediation: Users should update their Apple devices to the latest version of the operating system to apply the security patches addressing CVE-2025-14174 and CVE-2025-43529.
Read Original

Apple has released emergency updates to address two zero-day vulnerabilities that were actively exploited in highly sophisticated attacks targeting specific individuals. These flaws could allow attackers to gain unauthorized access to devices, putting sensitive information at risk. Users of affected devices are urged to update their systems immediately to protect against potential exploitation. The vulnerabilities were significant enough to prompt Apple to act quickly, indicating the serious nature of these threats. This situation emphasizes the ongoing risk that zero-day vulnerabilities pose, particularly for individuals in sensitive positions.

Impact: Apple devices including iPhones, iPads, and Macs running specific versions of iOS and macOS.
Remediation: Users should update their devices to the latest versions of iOS and macOS as per the emergency patches released by Apple.
Read Original

Coupang, a major South Korean e-commerce platform, recently suffered a significant data breach that compromised the personal information of approximately 33.7 million customers. Investigations revealed that the breach was the result of a former employee who had retained access to the company's internal systems after leaving. This situation raises serious concerns about how companies manage access permissions for departing employees. The exposed data could include sensitive customer information, potentially leading to identity theft or fraud. This incident serves as a reminder for businesses to regularly review and update their access control policies to safeguard against similar breaches in the future.

Impact: Coupang customer data, including personal information of 33.7 million users
Remediation: Companies should implement stricter access control measures and regularly audit user permissions, especially for departing employees.
Read Original

A serious security vulnerability in Gogs, a self-hosted Git service, is currently being exploited, affecting over 700 instances worldwide. This flaw, identified as CVE-2025-8110, has a CVSS score of 8.7 and allows attackers to overwrite files via the file update API. The lack of a patch means that many users are at risk, and researchers from Wiz have highlighted the urgency of addressing this issue. Companies using Gogs should take immediate action to secure their installations and monitor for any signs of compromise. The situation underscores the need for timely updates and vigilance in managing self-hosted services.

Impact: Gogs (self-hosted Git service), CVE-2025-8110
Remediation: A fix for the vulnerability is reportedly in development. Users should monitor for updates and apply patches as soon as they become available. In the meantime, users are advised to review their configurations and limit access to the Gogs instances to mitigate potential exploitation.
Read Original

IBM has addressed more than 100 vulnerabilities this week, with many of these issues stemming from third-party dependencies. Among the vulnerabilities, some were classified as critical, which means they could potentially allow attackers to exploit systems if left unpatched. This patching effort is crucial for organizations that rely on IBM software and services, as unaddressed vulnerabilities can lead to severe security breaches. Users should ensure they update their systems to the latest versions to protect against possible exploits. Regular updates and patches are essential in maintaining cybersecurity hygiene.

Impact: IBM software and services relying on third-party dependencies.
Remediation: Users should apply the latest patches and updates provided by IBM for their affected software.
Read Original

The UK's National Cyber Security Centre (NCSC) has been conducting trials to evaluate the effectiveness of cyber deception technologies in real-world scenarios. These trials aim to understand how deceptive techniques can confuse attackers and protect sensitive information. The NCSC has shared insights from these trials, indicating that such solutions can help organizations better defend against intrusions by misleading potential threats. This approach not only aims to enhance security measures but also to provide valuable data that organizations can use to improve their overall cybersecurity strategies. As cyber threats continue to evolve, understanding the role of deception in defense mechanisms could be crucial for businesses and government entities alike.

Impact: N/A
Remediation: N/A
Read Original

Google has addressed a zero-day vulnerability in its Chrome browser that was actively exploited in the wild. This vulnerability, which does not have a CVE identifier, remains shrouded in mystery, as details about its origin and the specific components it affects are unclear. The lack of a CVE means users and security experts have limited information regarding the potential risks involved. However, the fact that it has been exploited means users should update their Chrome browsers promptly to safeguard against potential attacks. Keeping software up to date is crucial in mitigating risks associated with such vulnerabilities.

Impact: Google Chrome browser (specific versions not mentioned)
Remediation: Users are advised to update their Chrome browsers to the latest version to protect against this vulnerability.
Read Original

The latest version of the Cyber Assessment Framework (CAF) has been released, aiming to address the rising threats to critical national infrastructure. This update emphasizes the need for organizations to reassess their cybersecurity strategies in light of evolving risks. The framework aims to provide guidance on how to enhance resilience against potential cyberattacks that could impact essential services and systems. It is particularly relevant for government agencies, utility providers, and other sectors that rely on critical infrastructure. By adopting the updated CAF, organizations can better prepare for and mitigate the risks posed by increasingly sophisticated cyber threats.

Impact: Critical national infrastructure, government agencies, utility providers
Remediation: Organizations are encouraged to adopt the updated Cyber Assessment Framework to enhance their cybersecurity measures.
Read Original

North Korea-linked cyber actors are exploiting a recently identified vulnerability in React Server Components known as React2Shell to deploy a new remote access trojan called EtherRAT. This malware utilizes Ethereum smart contracts to manage command-and-control communications and can establish multiple persistence mechanisms on Linux systems. The emergence of EtherRAT marks a concerning development as it allows attackers to maintain access to compromised systems. Companies using React Server Components need to be vigilant and update their systems to mitigate this risk. The situation emphasizes the ongoing threat posed by state-sponsored hacking groups and the importance of timely patching of known vulnerabilities.

Impact: React Server Components (RSC), Linux systems
Remediation: Update systems to patch the React2Shell vulnerability; specific patch details not provided.
Read Original

Recent reports indicate that various ransomware groups are utilizing a tool called Shanya, a packer-as-a-service platform, to enhance their ability to evade detection by endpoint security solutions. This tool assists attackers in bypassing endpoint detection and response (EDR) systems, making it easier for them to execute their malicious activities without being flagged. The use of Shanya shows a trend where ransomware operations are becoming more sophisticated, posing a significant risk to organizations that rely on EDR products for cybersecurity. Companies could be at greater risk of data breaches and financial losses if they do not update their security measures to counter these evolving tactics. As ransomware attacks continue to rise, understanding and mitigating these new methods is crucial for protecting sensitive information.

Impact: EDR systems and endpoint security products
Remediation: Organizations should enhance their endpoint detection capabilities and consider updating their security measures to recognize and block the use of packers like Shanya.
Read Original

Chrome 143 has been released with patches addressing 13 vulnerabilities, including a critical flaw in the V8 JavaScript engine. This update is crucial for maintaining the security of users against potential exploits targeting these vulnerabilities.

Impact: Google Chrome, V8 JavaScript engine
Remediation: Update to Chrome 143 or later to apply the patches.
Read Original

Microsoft has alerted users that FIDO2 security keys may require a PIN for sign-in following recent Windows updates since September 2025. This change could affect user experience and security practices, particularly for those relying on these security keys for authentication.

Impact: FIDO2 security keys, Windows operating system (updates since September 2025)
Remediation: Users should check for the latest Windows updates and follow any guidance provided by Microsoft regarding the use of FIDO2 security keys.
Read Original

The article discusses the risks associated with outdated operational technology (OT) security systems, drawing a parallel to the 1980s nostalgia of 'Stranger Things.' It emphasizes that reliance on legacy technology can expose organizations to significant cybersecurity threats, highlighting the need for modernization in security practices. The core issue is the potential vulnerabilities that arise when organizations fail to update their OT security measures.

Impact: N/A
Remediation: Organizations should modernize their OT security systems and practices to mitigate risks associated with legacy technology.
Read Original
PreviousPage 8 of 10Next