Articles tagged "Vulnerability"

Found 331 articles

Last week, a newly patched vulnerability in BeyondTrust's Remote Code Execution (RCE) software was exploited in the wild. This vulnerability poses significant risks as it allows attackers to execute commands on affected systems without authorization. BeyondTrust has issued patches to address this issue, but organizations using the affected software need to act quickly to apply these updates to prevent potential breaches. Additionally, in an interview, Deneen DeFiore, the Chief Information Security Officer at United Airlines, discussed the importance of resilience in cybersecurity. She emphasized that while prevention is crucial, organizations must also prepare for disruptions and manage risks associated with their interconnected vendor and partner ecosystems. This dual focus on resilience and safety is essential for maintaining operational integrity in today's complex digital landscape.

Impact: BeyondTrust RCE software
Remediation: Patches have been issued by BeyondTrust; users should apply these updates immediately.
Read Original

Fintech company Figure has confirmed a data breach resulting from a phishing attack that targeted one of its employees. The attackers used social engineering tactics to deceive the employee and gain access to a limited number of files. A spokesperson for Figure stated that while the breach is concerning, the extent of the data compromised is not extensive. This incident raises alarms about the effectiveness of employee training and awareness regarding phishing tactics, which continue to be a significant vulnerability for many organizations. Users and stakeholders of Figure should remain vigilant and monitor for any unusual activity related to their accounts.

Impact: Limited number of employee files
Remediation: Enhance employee training on phishing and social engineering tactics
Read Original

Atlas Air, a major U.S. cargo airline, has publicly rejected claims made by the Everest ransomware group that it successfully breached the airline's systems and stole 1.2 terabytes of sensitive technical information, including data related to Boeing aircraft. The airline insists that its operations remain secure and that there has been no compromise of its data. The allegations by Everest raise concerns about the vulnerability of critical infrastructure in the aviation sector, particularly as ransomware attacks have become more frequent and sophisticated. If the claims were true, it could have serious implications for aviation safety and security. However, with Atlas Air's denial, the situation remains unclear, and further investigation may be necessary to determine the validity of the ransomware group's claims.

Impact: Atlas Air systems, Boeing aircraft data
Remediation: N/A
Read Original

A serious vulnerability has been identified in the WPvivid backup plugin, tracked as CVE-2026-1357, which has a high severity score of 9.8. This issue affects all versions of the plugin up to version 0.9.123, leaving many WordPress sites potentially at risk. The flaw allows attackers to execute remote code, which could lead to unauthorized access or control over affected systems. Users of the plugin are strongly advised to take immediate action to protect their sites. This vulnerability poses a significant threat, especially for those who have not updated their plugins recently.

Impact: WPvivid backup plugin, all versions up to 0.9.123
Remediation: Users should update the WPvivid backup plugin to the latest version to mitigate this vulnerability.
Read Original

Hackers have begun exploiting a serious vulnerability in BeyondTrust Remote Support known as CVE-2026-1731, which allows unauthenticated remote code execution. This flaw was identified and a proof of concept (PoC) was released just a day prior to the exploitation attempts, indicating a rapid response from malicious actors. Organizations using BeyondTrust Remote Support should be particularly vigilant, as this vulnerability poses significant risks, potentially allowing attackers to take control of affected systems. The quick exploitation of this flaw underscores the importance of timely patch management and security measures to protect sensitive data and systems from unauthorized access. Users are urged to monitor for updates and apply any patches as soon as they become available to mitigate risks.

Impact: BeyondTrust Remote Support
Remediation: Organizations should apply any available patches for BeyondTrust Remote Support as soon as possible. Regularly review security settings and ensure that systems are updated to the latest versions to protect against this vulnerability.
Read Original

Recent zero-day vulnerabilities in Ivanti's Endpoint Manager Mobile (EPMM) have sparked renewed concern among cybersecurity experts. These flaws, which can be exploited by attackers, could potentially compromise sensitive data in mobile devices managed by the software. Organizations using EPMM must act quickly to secure their systems, as these vulnerabilities are already being exploited in the wild. Experts are urging a shift away from simply applying patches and towards more robust security measures, including better authentication controls and reducing unnecessary public interfaces. The urgency of the situation emphasizes the need for businesses to prioritize security and stay updated with the latest patches and practices.

Impact: Ivanti Endpoint Manager Mobile (EPMM)
Remediation: Implement patches as they become available; enforce stricter authentication controls; reduce public interfaces.
Read Original

A serious vulnerability has been discovered in BeyondTrust Remote Support and Privileged Remote Access appliances, allowing attackers to execute code remotely without authentication. This flaw has become a target for exploitation after a proof-of-concept (PoC) was made publicly available. Organizations using these systems should be particularly vigilant, as the flaw can lead to unauthorized access and potential data breaches. BeyondTrust has released patches to address this issue, and it’s crucial for users to apply these updates promptly to protect their systems. The urgency of this situation highlights the need for proactive security measures in remote access technologies.

Impact: BeyondTrust Remote Support and Privileged Remote Access appliances
Remediation: Patches have been released; users should update to the latest version of BeyondTrust products.
Read Original
Actively Exploited

Apple has addressed a serious zero-day vulnerability, identified as CVE-2026-20700, which was used in targeted attacks last year. This flaw, a memory corruption issue in the dyld component of Apple's operating systems, could allow attackers to execute arbitrary code on affected devices. Specifically, the vulnerability impacts versions of iOS prior to iOS 26 and was reportedly exploited in sophisticated attacks against select individuals. Users of these older versions should update their devices to protect against potential exploitation.

Impact: Affected products include Apple's iOS versions prior to iOS 26, particularly those using the dyld component.
Remediation: Users are advised to update their devices to the latest version of iOS to mitigate the vulnerabilities associated with CVE-2026-20700.
Read Original
Actively Exploited

Flashpoint has reported a significant decrease in the time it takes for vulnerabilities to be exploited after they are disclosed. This trend indicates that attackers are increasingly quick to take advantage of known flaws, especially N-Day vulnerabilities, which are issues that have been publicly disclosed but not yet patched by users. This shift poses a serious risk for organizations that may not act swiftly enough to secure their systems. The rapid exploitation can lead to increased incidents of data breaches and cyberattacks, affecting both businesses and their customers. Companies need to prioritize their patch management processes to mitigate these risks and protect sensitive information.

Impact: N-Day vulnerabilities across various software and systems
Remediation: Organizations should implement timely patch management and vulnerability assessments.
Read Original

Microsoft has recently patched six zero-day vulnerabilities, which are serious security flaws that attackers can exploit to gain unauthorized access. Users are typically urged to update their systems immediately to protect against such threats. However, some experts are advising caution, suggesting that these patches might cause issues or conflicts with existing software. This situation leaves many users in a challenging position as they weigh the risks of applying the updates against the potential vulnerabilities. It's important for individuals and organizations to assess their specific environments before proceeding with the updates to ensure they don't inadvertently create new problems.

Impact: Microsoft Windows, Microsoft Office, Microsoft Edge
Remediation: Apply the latest patches from Microsoft, but check for compatibility issues before updating.
Read Original

The Netherlands Police have arrested a 21-year-old man from Dordrecht for allegedly selling access to a phishing tool known as JokerOTP. This tool is designed to capture one-time passwords (OTPs), which attackers can use to hijack online accounts. By exploiting this vulnerability, cybercriminals can gain unauthorized access to sensitive information and accounts, posing a significant threat to individuals and organizations alike. The arrest underscores ongoing efforts by law enforcement to crack down on cybercrime and the tools that facilitate it. Users are advised to remain vigilant and use additional security measures to protect their accounts from such phishing attempts.

Impact: JokerOTP phishing tool, online accounts
Remediation: Users should enable multi-factor authentication (MFA) wherever possible and be cautious of unsolicited messages requesting OTPs.
Read Original

A recent data breach involving Conduent has compromised the personal information of nearly 17,000 employees at Volvo Group, part of a much larger incident affecting at least 25 million individuals. Initially thought to involve only 10 million people, the breach has expanded significantly, raising concerns about data security across numerous organizations. The exposed data could include sensitive information, putting affected employees at risk for identity theft and other malicious activities. This incident emphasizes the need for companies to bolster their cybersecurity measures and protect sensitive employee data. The breach's scale indicates a potential vulnerability in third-party vendor systems, which can have widespread implications for many businesses relying on such services.

Impact: Data of approximately 17,000 Volvo Group employees, potentially including personal and sensitive information.
Remediation: Companies should review their data protection policies and enhance security measures for third-party vendor access.
Read Original

Ivanti has addressed a serious security flaw in its Endpoint Manager software, which was disclosed in October 2025. A high-severity authentication bypass vulnerability was identified, allowing attackers to remotely exploit the system without needing any form of authentication. This means that unauthorized users could potentially gain access to sensitive credentials. The implications of this vulnerability are significant, as it could expose organizations to data breaches and unauthorized access. Users of Ivanti Endpoint Manager are strongly encouraged to apply the latest patches to secure their systems and safeguard their information.

Impact: Ivanti Endpoint Manager
Remediation: Apply the latest patches provided by Ivanti for Endpoint Manager.
Read Original

According to a recent forecast by FIRST, the cybersecurity community is bracing for a record-breaking year in 2026, with over 50,000 new Common Vulnerabilities and Exposures (CVEs) expected to be disclosed. This increase in vulnerabilities can significantly impact a wide range of software and hardware products, potentially affecting millions of users and organizations. With such a high number of CVEs, companies across various sectors will need to prioritize their cybersecurity measures to protect against potential exploits. The sheer volume of vulnerabilities also poses a challenge for security teams, who must assess and patch these issues effectively to maintain system integrity. This forecast serves as a critical reminder for businesses to stay vigilant and proactive in their cybersecurity strategies.

Impact: N/A
Remediation: Companies should prioritize cybersecurity measures and patch vulnerabilities as they are disclosed.
Read Original

A recent security audit conducted by Google and Intel has uncovered a serious vulnerability in the Trusted Execution Environment (TDX) that could allow attackers to fully compromise affected systems. This issue affects various products utilizing TDX technology, which is designed to enhance security by isolating sensitive data. The discovery of this vulnerability raises significant concerns for organizations relying on TDX for data protection, as it could lead to unauthorized access and data breaches. Companies using affected systems should prioritize investigation and remediation efforts to safeguard their environments. As of now, there is no indication of this vulnerability being actively exploited in the wild, but the potential for future attacks remains a pressing concern.

Impact: Products utilizing TDX technology, specific vendors and systems not specified
Remediation: Companies should investigate and apply necessary patches or updates as they become available to mitigate the vulnerability.
Read Original
Page 1 of 23Next