Ivanti has patched two vulnerabilities in its Neurons for IT Service Management (ITSM) product that could allow remote attackers to maintain access to user accounts even after they have been disabled. Additionally, these flaws could enable attackers to access information from other user sessions. This raises serious concerns for organizations using Ivanti's ITSM solutions, as it puts sensitive user data at risk and undermines account security. Companies should ensure they update to the latest versions to mitigate these risks and protect their systems from potential exploitation. The vulnerabilities highlight the need for continuous monitoring and prompt application of security patches in IT management tools.
Articles tagged "Update"
Found 137 articles
Hackread – Cybersecurity News, Data Breaches, AI and More
A serious vulnerability identified as CVE-2026-5194 has been found in wolfSSL, affecting a vast array of devices, including Internet of Things (IoT) devices, routers, and military systems. This flaw allows attackers to forge digital identities, which poses a significant risk to the security of billions of devices globally. Users and organizations utilizing wolfSSL should promptly update to version 5.9.1 to mitigate this risk. The widespread impact of this vulnerability emphasizes the importance of regular software updates to maintain security across various platforms. Failure to address this issue could lead to unauthorized access and potential exploitation of sensitive systems.
Hackread – Cybersecurity News, Data Breaches, AI and More
ViperTunnel is a new backdoor malware linked to the DragonForce ransomware, specifically targeting businesses that operate on Windows servers in the US and the UK. This Python-based malware allows attackers to gain unauthorized access to systems, which can lead to data theft or further exploitation. Companies utilizing Windows server environments should be particularly vigilant, as the malware poses a significant risk to their operations and data security. The emergence of ViperTunnel highlights the ongoing challenges businesses face in protecting their networks from evolving ransomware threats. Organizations are urged to implement strong security measures and regularly update their systems to fend off such attacks.
SCM feed for Latest
Synthetic identity fraud is on the rise, with a recent analysis from LexisNexis Risk Solutions revealing an eightfold increase in reported cases. This type of fraud now accounts for eleven percent of all fraud incidents worldwide, indicating a troubling trend where attackers are using generative AI to create convincing fake identities. This surge poses significant risks to financial institutions and businesses, as they may unknowingly engage with these fraudulent identities, leading to financial losses and compromised customer data. The growing sophistication of these scams makes it crucial for organizations to enhance their identity verification processes and stay vigilant against AI-driven deception.
OpenAI has announced that its Mac applications require an update due to a security incident linked to the Axios hack. The company reported that a developer tool inadvertently fetched a compromised version of a widely used open-source library. However, OpenAI reassured users that the integrity of its overall systems and software remained intact. This incident highlights the risks associated with third-party libraries and the importance of maintaining secure development practices. Users of OpenAI's Mac apps should ensure they update to the latest versions to mitigate any potential issues arising from this vulnerability.
SCM feed for Latest
A serious vulnerability, known as CVE-2026-39987, has been discovered in all versions of Marimo prior to 0.23.0, earning a high CVSS score of 9.3. This flaw allows attackers to potentially exploit systems running affected versions of the software, raising significant security concerns for users. Researchers noted that the vulnerability was actively exploited within hours of its disclosure, indicating a swift response from malicious actors. Users of Marimo are urged to update to version 0.23.0 or later to protect their systems from potential attacks. This incident emphasizes the critical need for timely software updates in response to newly identified vulnerabilities.
Cybersecurity teams are facing an increasing number of credential-based attacks, which are becoming more sophisticated and harder to detect. To combat this trend, experts suggest that teams need to shift their detection models to better identify these threats as they evolve. This includes adapting to the changing tactics used by attackers, who often disguise their activities to look like normal business operations. As organizations continue to rely on digital credentials for access, the risk of these types of attacks grows, potentially leading to significant data breaches and financial losses. Companies must stay vigilant and update their security strategies to protect against these emerging threats.
In the latest update, Chrome version 147 has addressed a total of 60 vulnerabilities, including two that are classified as critical. These critical flaws are linked to the browser's WebML component and were reported by anonymous researchers. The vulnerabilities are significant enough that they come with a combined bounty of $86,000 for anyone who can exploit them. Users of Chrome should ensure they are using the updated version to protect against potential attacks. Regular updates like this are crucial as they help safeguard users from newly discovered security risks.
Attackers have compromised the update system for the Smart Slider 3 Pro plugin, a widely used tool for WordPress and Joomla, allowing them to distribute a malicious version containing a backdoor. This incident affects users of Smart Slider 3 Pro version 3.5.1.35 for WordPress, which has over 800,000 active installations. The backdoor could potentially allow unauthorized access to affected websites, putting sensitive data at risk. Users are urged to check their installations and ensure they are using a secure version of the plugin to prevent exploitation. This incident serves as a reminder of the vulnerabilities in third-party update systems and the importance of maintaining software security.
A recently patched vulnerability in the EngageLab SDK, a third-party software development kit used in many Android applications, has potentially exposed the private data of around 50 million users, including 30 million cryptocurrency wallet holders. The flaw allowed apps on the same device to bypass Android's security measures, enabling unauthorized access to sensitive information. This incident raises significant concerns about the security of users' cryptocurrency assets, as the compromised data could have led to theft or fraud. Developers using the EngageLab SDK are urged to update their applications to protect users from potential attacks. The vulnerability was identified and addressed, but users should remain vigilant about app permissions and security practices.
Hackers have compromised the update system for the Smart Slider 3 Pro plugin, which is used in WordPress and Joomla websites. These attackers managed to distribute a malicious version of the plugin that contains multiple backdoors, allowing them to access and control affected sites. This incident puts users of both platforms at risk, as the malicious code can lead to data breaches and unauthorized actions on their websites. Website administrators should be particularly vigilant, as the compromised update could have far-reaching consequences if not addressed promptly. Users are strongly advised to check their installations and update to the latest secure versions to mitigate any potential damage.
SecurityWeek
OpenSSL has released patches for seven vulnerabilities, with many of them potentially allowing denial-of-service (DoS) attacks. The most notable of these is a data leakage vulnerability that could expose sensitive information. This issue affects a wide range of systems that rely on OpenSSL for secure communications, making it crucial for organizations to update their software to protect against possible exploits. Users and companies should prioritize applying the latest updates to mitigate risks associated with these vulnerabilities. Ignoring these patches could leave systems vulnerable to attacks that disrupt services or compromise data security.
SCM feed for Latest
A critical vulnerability has been discovered in Ninja Forms, a popular WordPress plugin, with a severity rating of 9.8 out of 10. This flaw affects versions up to 3.3.26 and could allow attackers to execute remote code on affected sites. Users running this version of Ninja Forms are at significant risk, as the vulnerability could be exploited to gain unauthorized access or control over their websites. It's crucial for website administrators to address this issue promptly to prevent potential exploitation. Users should update to the latest version of the plugin to protect their sites from this serious threat.
Grafana has patched a significant vulnerability that could have allowed attackers to exploit artificial intelligence features on their platform. By embedding harmful instructions in a webpage controlled by the attacker, the AI could interpret these commands as legitimate requests, potentially leading to the exposure of sensitive user data. This issue raises concerns for organizations using Grafana, as it highlights the risks associated with AI integrations in web applications. Users are advised to update their Grafana installations to safeguard against this vulnerability, which could have serious implications for data security if left unaddressed.
APT28, a Russian state-linked hacking group, has been exploiting vulnerabilities in MikroTik and TP-Link routers as part of a global cyber espionage campaign. Since at least May 2025, the group has targeted these routers to change their settings, effectively turning them into tools for malicious activities. This campaign raises significant concerns for users of these devices, as it can lead to unauthorized access to sensitive information and potential data breaches. The exploitation highlights the importance of securing home and small office routers, which are often overlooked in cybersecurity discussions. Users are urged to update their firmware and review their router settings to prevent unauthorized access.