Articles tagged "Update"

Found 89 articles

In December 2025, npm implemented significant changes to its authentication process following the Sha1-Hulud incident, which was a notable supply-chain attack. While these updates are a positive move toward enhancing security, they do not fully protect npm projects from future supply-chain attacks or malware. Users of npm should remain vigilant, as the platform is still vulnerable to potential malware threats. This situation serves as a reminder that even after security improvements, the risk of attacks persists, and both developers and organizations need to adopt best practices to safeguard their projects. Staying informed and proactive is essential for a safer Node community.

Impact: npm projects and dependencies
Remediation: Adopt best security practices for npm projects; monitor dependencies for vulnerabilities.
Read Original
Actively Exploited

Apple has addressed a serious zero-day vulnerability, identified as CVE-2026-20700, which was used in targeted attacks last year. This flaw, a memory corruption issue in the dyld component of Apple's operating systems, could allow attackers to execute arbitrary code on affected devices. Specifically, the vulnerability impacts versions of iOS prior to iOS 26 and was reportedly exploited in sophisticated attacks against select individuals. Users of these older versions should update their devices to protect against potential exploitation.

Impact: Affected products include Apple's iOS versions prior to iOS 26, particularly those using the dyld component.
Remediation: Users are advised to update their devices to the latest version of iOS to mitigate the vulnerabilities associated with CVE-2026-20700.
Read Original

Microsoft has recently patched six zero-day vulnerabilities, which are serious security flaws that attackers can exploit to gain unauthorized access. Users are typically urged to update their systems immediately to protect against such threats. However, some experts are advising caution, suggesting that these patches might cause issues or conflicts with existing software. This situation leaves many users in a challenging position as they weigh the risks of applying the updates against the potential vulnerabilities. It's important for individuals and organizations to assess their specific environments before proceeding with the updates to ensure they don't inadvertently create new problems.

Impact: Microsoft Windows, Microsoft Office, Microsoft Edge
Remediation: Apply the latest patches from Microsoft, but check for compatibility issues before updating.
Read Original

In February 2026, Microsoft addressed over 50 security vulnerabilities during its Patch Tuesday update, including six zero-day flaws that were actively exploited by attackers. Notably, three of these zero-days involve security feature bypasses. One of the vulnerabilities, identified as CVE-2026-21513, impacts the MSHTML/Trident browser engine used in Internet Explorer on Windows, while CVE-2026-21514 affects Microsoft Word. Attackers can exploit these vulnerabilities by tricking users into opening malicious files or links. As these security holes are actively being exploited, users and organizations must apply the updates promptly to protect their systems from potential breaches.

Impact: Microsoft Windows (Internet Explorer), Microsoft Word
Remediation: Users are advised to install the latest security updates from Microsoft to mitigate these vulnerabilities. Specific patches addressing these issues were released as part of the February 2026 Patch Tuesday.
Read Original

SAP has issued 26 new security notes along with one updated note addressing vulnerabilities in several of its products, including CRM, S/4HANA, and NetWeaver. This update was released on February 2026's security patch day, indicating that these vulnerabilities could pose significant risks to organizations using these systems. Companies that rely on SAP solutions should prioritize applying these patches to protect against potential exploitation. The vulnerabilities could allow attackers to gain unauthorized access or disrupt services, which can have serious consequences for businesses. It's crucial for SAP users to stay informed and act promptly to safeguard their systems.

Impact: SAP CRM, SAP S/4HANA, SAP NetWeaver
Remediation: Apply the 26 new security notes and the updated note released by SAP.
Read Original

In February 2026, a significant security update was released that addressed 59 Common Vulnerabilities and Exposures (CVEs), including six zero-day vulnerabilities. These vulnerabilities could allow attackers to gain unauthorized access or execute malicious code on affected systems. Various products from multiple vendors are impacted, which means a wide range of users, including businesses and individual consumers, could be at risk. The presence of zero-day vulnerabilities indicates that attackers could exploit these weaknesses before users have the chance to apply the necessary patches. Companies and users are urged to update their systems promptly to mitigate potential risks associated with these vulnerabilities. Ignoring these updates could expose them to serious security breaches.

Impact: Windows Operating System, Microsoft Office products, various third-party applications
Remediation: Users are advised to apply the latest patches released during February 2026 Patch Tuesday, specifically targeting CVEs identified in the update.
Read Original

Hackers are exploiting vulnerabilities in SolarWinds Web Help Desk (WHD) to gain unauthorized access to systems. This allows them to execute code on affected machines, deploying legitimate forensic tools like Velociraptor to maintain persistence and enable remote control. Organizations using SolarWinds WHD should be particularly vigilant, as these vulnerabilities can lead to serious security breaches. The situation underscores the need for companies to regularly update and patch their systems to protect against such attacks. Users of the software must act quickly to ensure their environments are secure.

Impact: SolarWinds Web Help Desk (WHD)
Remediation: Organizations should patch SolarWinds WHD to the latest version and implement security best practices to mitigate exposure.
Read Original

The European Commission is taking action against Meta, alleging that the company violated EU competition laws by restricting access to WhatsApp for third-party AI assistants. In a change announced on October 15, 2025, Meta updated its WhatsApp Business Solution Terms, effectively preventing outside AI programs from interacting with users on the platform. Since January 15, 2026, Meta's own AI assistant has been the only one allowed on WhatsApp. The Commission is planning to impose interim measures while investigating these practices. This situation raises concerns about competition and innovation in the AI space, as limiting access could stifle the development of alternative AI solutions that could benefit users.

Impact: WhatsApp, Meta AI, third-party AI assistants
Remediation: N/A
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has updated 59 entries in its Known Exploited Vulnerabilities (KEV) catalog to indicate that these vulnerabilities are being actively exploited in ransomware attacks. This update raises concerns among security experts because it implies that organizations may be unaware that their systems are vulnerable to these specific attacks. The vulnerabilities affect a range of products, and the updates were made without much public awareness, which could leave many companies at risk. It's crucial for organizations to review these updates and apply necessary patches to protect against potential ransomware threats. This situation stresses the need for better communication regarding vulnerability management in the cybersecurity community.

Impact: Various products and systems listed in CISA's KEV catalog
Remediation: Organizations should review CISA's KEV catalog and apply relevant patches or updates for the specified vulnerabilities.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has been updating software vulnerabilities related to ransomware without notifying cybersecurity defenders, as pointed out by Glenn Thorpe of GreyNoise. This lack of transparency could lead to missed ransomware intrusions, as defenders may not be aware of the vulnerabilities that have been patched. The updates affected numerous software vulnerabilities last year, raising concerns about the potential risks for organizations relying on these systems. The situation emphasizes the need for better communication between CISA and cybersecurity professionals to ensure that all parties are informed about critical updates that could impact security posture.

Impact: Numerous software vulnerabilities related to ransomware, specific products not mentioned
Remediation: N/A
Read Original

The Global Threat Map is an open-source initiative designed to provide security teams with real-time visibility of cyber incidents worldwide. It aggregates various open data feeds into an interactive map that displays key indicators like malware spread, phishing attempts, and attack traffic based on geographic location. Unlike traditional threat maps, which are often produced by security vendors, this project relies on community contributions to maintain and update the data. This platform is particularly valuable for organizations looking to enhance their situational awareness and respond to emerging threats more effectively. By utilizing open-source data, it fosters collaboration among security professionals and helps them stay informed about the latest cyber activities that could impact their operations.

Impact: N/A
Remediation: N/A
Read Original

A serious SQL injection vulnerability has been identified in the Quiz and Survey Master plugin, affecting approximately 40,000 WordPress sites. This flaw allows attackers to manipulate the database and potentially access sensitive information. Users of the affected plugin need to take immediate action to secure their sites to prevent unauthorized access and data breaches. Website owners are urged to update the plugin to the latest version as soon as possible to mitigate these risks. The discovery of this vulnerability serves as a reminder for all WordPress site administrators to regularly monitor and update their plugins to ensure their sites remain secure.

Impact: Quiz and Survey Master plugin for WordPress
Remediation: Update the Quiz and Survey Master plugin to the latest version.
Read Original
Actively Exploited

Researchers have identified a new ransomware-as-a-service (RaaS) variant known as 'Vect'. This operation stands out due to its custom malware, which poses a significant threat to organizations. The Vect RaaS allows attackers to easily deploy ransomware attacks, potentially affecting a wide range of victims, from small businesses to larger enterprises. The introduction of this variant raises concerns about the increasing sophistication of ransomware operations, making it crucial for companies to bolster their cybersecurity measures. Users are advised to stay vigilant and regularly update their security protocols to defend against such evolving threats.

Impact: Organizations utilizing outdated cybersecurity measures and systems.
Remediation: Organizations should implement strong security protocols, regular software updates, and employee training on phishing and ransomware prevention.
Read Original

Hackers have successfully compromised an update server belonging to MicroWorld Technologies, the company behind eScan Antivirus. This breach allowed attackers to inject malicious files into updates that were sent to eScan customers, effectively turning the antivirus software into a delivery mechanism for malware. Users who updated their eScan software during this incident may have inadvertently installed harmful files on their systems. This incident raises significant concerns about the security of software supply chains, highlighting how even trusted software can be weaponized. Users are advised to remain vigilant and consider checking their systems for any signs of compromise.

Impact: eScan Antivirus software
Remediation: Users should uninstall the compromised version of eScan and install the latest clean version from the official website. Regular system scans and updates are recommended.
Read Original

SmarterTools has released patches for two vulnerabilities in its SmarterMail email software, one of which is classified as critical. This flaw, identified as CVE-2026-24423, has a CVSS score of 9.3 and could allow attackers to execute arbitrary code on systems running affected versions of SmarterMail. Users of SmarterMail versions prior to build 9511 are particularly at risk. It's crucial for organizations using this software to update immediately to protect against potential exploitation. The existence of such a high-severity vulnerability underscores the importance of regular software updates and vigilance in cybersecurity practices.

Impact: SmarterMail versions prior to build 9511
Remediation: Users should update to SmarterMail build 9511 or later to mitigate the risks associated with this vulnerability.
Read Original
Page 1 of 6Next