Articles tagged "Critical"

Found 576 articles

Researchers from Defused have reported ongoing attacks exploiting a serious SQL injection vulnerability in Fortinet's FortiClient EMS, identified as CVE-2026-21643. These intrusions have been active since March 24, raising concerns for organizations using this software. SQL injection vulnerabilities allow attackers to manipulate database queries, potentially leading to unauthorized access and data breaches. Companies utilizing FortiClient EMS are urged to take immediate action to protect their systems and data from these exploits. The situation emphasizes the need for regular security updates and vigilance against emerging threats.

Impact: Fortinet FortiClient EMS
Remediation: Organizations should patch FortiClient EMS to the latest version as soon as possible. Regularly monitor systems for unusual activity and implement web application firewalls to help filter malicious traffic. Conduct a review of database queries to ensure they are secure against SQL injection attacks.
Read Original

The shift to cloud and Software as a Service (SaaS) platforms in higher education has led to significant security challenges as traditional campus security boundaries fade away. Experts are raising concerns about the oversight of cloud security in educational institutions, emphasizing the need for better management of critical services, institutional data, and user identities that now exist in numerous cloud environments. With this transition, universities may be exposing themselves to a range of cybersecurity risks, including data breaches and unauthorized access. The article suggests that educational institutions need to reassess their security strategies to protect sensitive information effectively. This is particularly important as the reliance on cloud services continues to grow, making it vital for schools to implement strong security measures.

Impact: Cloud services, SaaS platforms used in higher education
Remediation: Educational institutions should reassess and strengthen their cloud security strategies
Read Original

A serious vulnerability has been discovered in the Telegram messaging app, which can reportedly be triggered by a corrupted sticker. This flaw has been assigned a CVSS score of 9.8, indicating its severity. However, Telegram has denied the existence of this vulnerability, which raises questions about user safety. If this flaw is real, it poses a significant risk to Telegram users, as it could allow attackers to exploit the app without any user interaction, making it a no-click attack. The situation is concerning, especially for those who rely on Telegram for secure messaging.

Impact: Telegram messaging app
Remediation: N/A
Read Original

A newly disclosed vulnerability in Telegram could allow attackers to execute code on users' devices without any interaction, making it a significant security risk. This flaw, identified by researcher Michael DePlante and tracked as ZDI-CAN-30207, has a CVSS score of 9.8, indicating its severity. Telegram has denied the existence of this issue, which raises concerns about user safety and device security. If confirmed, this vulnerability could affect millions of users who rely on Telegram for messaging. Users should remain vigilant and follow updates from Telegram regarding this potential threat.

Impact: Telegram messaging app
Remediation: N/A
Read Original

A serious SQL injection vulnerability, tracked as CVE-2026-21643, has been discovered in Fortinet's FortiClient Endpoint Management Server (EMS), which manages FortiClient endpoint agents across multiple platforms. This vulnerability is currently being actively exploited, as reported by Defused Cyber, a firm that specializes in threat intelligence. Although it has not yet been listed on CISA’s Known Exploited Vulnerabilities (KEV) list, the ongoing attacks pose significant risks to organizations using FortiClient EMS. Companies should take immediate action to assess their systems and implement necessary security measures to safeguard against potential breaches. The situation emphasizes the need for vigilance in monitoring and securing endpoint management solutions.

Impact: Fortinet FortiClient Endpoint Management Server (EMS)
Remediation: Organizations should promptly review their FortiClient EMS configurations and apply any available patches or updates from Fortinet. It is also advisable to implement web application firewalls (WAFs) or other intrusion prevention systems (IPS) to help mitigate SQL injection attacks. Regular vulnerability assessments and security monitoring should be conducted to identify and remediate any potential exploitation vectors.
Read Original

Iranian hacking groups are increasingly using high-volume cyberattacks that have a low impact but can disrupt systems and services. These attacks have been enhanced by artificial intelligence, making them more effective. Affected entities include hospitals and other critical infrastructure, which are particularly vulnerable to these tactics. This trend reflects a growing integration of digital warfare in geopolitical conflicts, posing risks not only to the targeted organizations but also to public safety and national security. As these cyber threats evolve, it becomes crucial for organizations to bolster their cybersecurity measures and stay vigilant against potential attacks.

Impact: Hospitals, critical infrastructure systems
Remediation: Organizations should enhance their cybersecurity defenses, conduct regular security assessments, and train staff on recognizing potential cyber threats.
Read Original

F5 Networks has escalated the severity of a vulnerability in its BIG-IP Application Policy Manager (APM) from a denial-of-service issue to a critical remote code execution flaw. This vulnerability allows attackers to exploit unpatched devices and deploy webshells, which can give them unauthorized access to systems. Organizations using affected versions of BIG-IP are urged to apply the necessary patches immediately to prevent potential breaches. The exploitation of this flaw poses a significant risk, especially for businesses relying on BIG-IP for application delivery and security. With reports of active attacks already in progress, it is crucial for users to take swift action to secure their environments.

Impact: F5 BIG-IP APM
Remediation: Users should patch their systems to the latest version as specified by F5 to mitigate this vulnerability.
Read Original

Researchers from watchTowr and Defused have discovered that attackers are exploiting CVE-2026-3055, a serious vulnerability affecting Citrix NetScaler. This flaw allows unauthorized access to systems that utilize the NetScaler product, which is commonly used for application delivery and load balancing. Organizations using NetScaler are at risk, as the vulnerability is currently being actively targeted in the wild. Companies should be aware of this threat and take immediate action to protect their systems, as the consequences of exploitation could lead to significant data breaches and operational disruptions. It's crucial for affected users to stay informed and apply any available patches as soon as possible.

Impact: Citrix NetScaler products, specifically versions affected by CVE-2026-3055.
Remediation: Organizations should apply the latest security patches provided by Citrix for NetScaler. Regularly check for updates and ensure that all systems are up to date. Additionally, consider implementing network segmentation to limit exposure.
Read Original

A serious vulnerability in Fortinet's FortiClient EMS platform, identified as CVE-2026-21643, is currently being exploited by attackers. This flaw, which has a CVSS score of 9.1, allows for remote code execution through SQL injection. Researchers from Defused have reported active exploitation of this vulnerability, posing significant risks to organizations using FortiClient EMS. Companies are urged to take immediate action to protect their systems, as the potential for unauthorized access and control could lead to severe consequences. It is essential for affected users to stay informed and apply any available patches promptly to mitigate the risks associated with this flaw.

Impact: Fortinet FortiClient EMS platform
Remediation: Organizations should apply patches provided by Fortinet for the CVE-2026-21643 vulnerability as soon as they are available. Additionally, users should review their SQL database configurations and implement input validation to protect against SQL injection attacks.
Read Original

A serious vulnerability in Fortinet's FortiClient EMS platform is currently being exploited by attackers, according to the threat intelligence firm Defused. This flaw poses significant risks to organizations using the affected software, as it allows unauthorized access and potential control over their systems. Companies that rely on FortiClient EMS for endpoint management and security should urgently assess their systems to mitigate the risk. The ongoing exploitation of this vulnerability underscores the need for timely updates and security patches to protect sensitive data and maintain system integrity. Users are advised to follow best practices for cybersecurity and monitor for any unusual activities.

Impact: Fortinet FortiClient EMS platform
Remediation: Organizations should apply the latest security patches from Fortinet and ensure their systems are updated to the most recent versions to mitigate this vulnerability.
Read Original

At the BSides SF 2026 hacker conference, a researcher warned that Software as a Service (SaaS) and cloud assets are increasingly vulnerable to identity-based ransomware attacks. This type of attack exploits weaknesses in identity management systems, allowing attackers to gain unauthorized access and encrypt critical data. Organizations that rely on cloud services for their operations, especially those with inadequate security measures in place, are at significant risk. The researcher emphasized that as more businesses transition to these platforms, the need for robust identity protection becomes essential. Companies should prioritize enhancing their identity security protocols to mitigate these risks and protect sensitive customer information.

Impact: SaaS platforms, cloud services
Remediation: Enhance identity security protocols, implement two-factor authentication, conduct regular security assessments
Read Original

Recent reports indicate a significant decline in infrastructure attacks that could lead to physical consequences, specifically a 25% drop in incidents targeting operational technology (OT) at industrial and critical infrastructure sites. This decrease appears to be linked to a temporary lull in ransomware attacks and hackers' limited understanding of OT systems. While this might seem like positive news, the underlying issue remains that many attackers still lack expertise in these environments, which could change. This situation raises concerns about the long-term security posture of critical infrastructure, as attackers could eventually adapt and exploit these vulnerabilities. Companies operating in these sectors should remain vigilant and enhance their security measures to protect against potential threats in the future.

Impact: Operational technology systems at industrial and critical infrastructure sites
Remediation: Companies should enhance their security measures and monitor for potential threats.
Read Original

A pro-Ukrainian hacking group known as Bearlyfy has carried out over 70 cyber attacks against Russian companies since January 2025. Their recent campaigns have utilized a custom ransomware known as GenieLocker, which targets Windows systems. This group aims to disrupt operations in Russian businesses, indicating a strategic move in the ongoing conflict between Ukraine and Russia. The use of ransomware adds a financial pressure point, potentially crippling affected organizations. As these attacks continue, it raises concerns about the security of critical infrastructure and business operations in the region.

Impact: Russian companies, Windows systems, GenieLocker ransomware
Remediation: N/A
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding a serious vulnerability in the Langflow framework, designated as CVE-2026-33017. This flaw allows attackers to hijack AI workflows, potentially leading to unauthorized access and manipulation of AI systems. Organizations using Langflow should be particularly vigilant as the vulnerability is currently being exploited in the wild. This situation poses significant risks not only to the integrity of AI applications but also to the security of the data they handle. Immediate action is recommended to mitigate risks associated with this vulnerability.

Impact: Langflow framework for building AI agents
Remediation: Users should apply security patches provided by Langflow, review their configurations, and consider implementing additional access controls to protect their AI workflows from exploitation.
Read Original

A backdoor known as BPFdoor, linked to Chinese cyber actors, has been discovered operating within the Linux kernel of key telecom servers and Kubernetes pods. First identified in 2021, this backdoor is now posing a significant risk to global telecommunications infrastructure. Researchers found that BPFdoor's stealthy design allows it to evade detection while compromising critical systems. This situation is concerning as it impacts the reliability and security of telecom services worldwide, potentially allowing attackers to intercept communications or disrupt services. Companies in the telecom sector need to be vigilant and take immediate action to secure their systems against this threat.

Impact: Linux kernel in telecom servers, Kubernetes pods
Remediation: Companies should review their security protocols, apply the latest kernel patches, and monitor for unusual activity within their systems.
Read Original
PreviousPage 8 of 39Next