#dns-misconfiguration

[ follow ]
#microsoft
Information security
fromSecurityWeek
3 hours ago

Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities

Microsoft's Patch Tuesday updates address 165 vulnerabilities, including a critical SharePoint zero-day exploit tracked as CVE-2026-32201.
fromComputerWeekly.com
2 hours ago
Information security

April Patch Tuesday brings zero-days in Defender, SharePoint Server | Computer Weekly

Microsoft's April Patch Tuesday update addresses over 160 issues, including two critical zero-day vulnerabilities, marking one of the largest updates in history.
Information security
fromSecurityWeek
3 hours ago

Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities

Microsoft's Patch Tuesday updates address 165 vulnerabilities, including a critical SharePoint zero-day exploit tracked as CVE-2026-32201.
Information security
fromComputerWeekly.com
2 hours ago

April Patch Tuesday brings zero-days in Defender, SharePoint Server | Computer Weekly

Microsoft's April Patch Tuesday update addresses over 160 issues, including two critical zero-day vulnerabilities, marking one of the largest updates in history.
DevOps
fromTechzine Global
1 day ago

Cloudflare introduces new features for building and deploying agents

Cloudflare is transforming AI development with Dynamic Workers, Sandboxes, and Artifacts for secure, scalable, and efficient code execution.
#cybersecurity
fromZDNET
4 days ago
Information security

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

fromTechSpot
5 days ago
Information security

Hackers are turning home routers into tools to spy on Microsoft 365 users

Information security
fromSecurityWeek
6 days ago

US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking

The US disrupted a Russian espionage operation using hacked SOHO routers to capture sensitive data from victims.
Privacy technologies
fromYahoo Tech
4 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Information security
fromZDNET
4 days ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Information security
fromTechSpot
5 days ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
Information security
fromSecurityWeek
6 days ago

US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking

The US disrupted a Russian espionage operation using hacked SOHO routers to capture sensitive data from victims.
Node JS
fromZero Day Initiative
6 days ago

Zero Day Initiative - Node.js Trust Falls: Dangerous Module Resolution on Windows

Node.js module resolution can lead to security vulnerabilities if malicious packages are placed in the root node_modules directory.
Information security
fromThe Hacker News
4 hours ago

New PHP Composer Flaws Enable Arbitrary Command Execution - Patches Released

Two high-severity vulnerabilities in Composer could allow arbitrary command execution through command injection flaws in the Perforce VCS driver.
fromThe Hacker News
7 hours ago

Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security

The new Rust-based DNS parser significantly reduces our security risk by mitigating an entire class of vulnerabilities in a risky area, while also laying the foundation for broader adoption of memory-safe code in other areas.
Information security
Information security
fromSecurityWeek
13 hours ago

Organizations Warned of Exploited Windows, Adobe Acrobat Vulnerabilities

CISA expanded its Known Exploited Vulnerabilities catalog with seven new vulnerabilities, including critical Windows and Adobe flaws.
DevOps
fromTheregister
2 weeks ago

Documentation can contain malicious instructions for agents

Context Hub may enhance API usage but poses risks of software supply chain attacks through unverified documentation.
Information security
fromTechzine Global
1 day ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Information security
fromTheregister
1 day ago

Ransomware scum, other crims exploit 4 old Microsoft bugs

Four Microsoft vulnerabilities are actively exploited, including one from 2012, prompting CISA to urge federal agencies to patch them within two weeks.
fromTheregister
1 month ago

DR-DOS rises again - rebuilt from scratch, not open source

The long-dormant DR-DOS.com website is alive again, and DR-DOS 9.0 is in development. There have been six preliminary releases so far this year. The current work-in-progress version is version 9.0.291. This is not the same OS as the DOS-compatible OS that Digital Research developed back in the 1980s, working on the basis of its multitasking multiuser Concurrent DOS OS.
Software development
Privacy professionals
fromSecurityWeek
1 month ago

Internet Infrastructure TLD .arpa Abused in Phishing Attacks

Threat actors abuse the .arpa TLD infrastructure to host phishing content by exploiting DNS provider controls to add IP address records where only reverse DNS records should exist.
DevOps
fromTechzine Global
4 weeks ago

NinjaOne launches Vulnerability Management for detection and remediation

NinjaOne's Vulnerability Management solution enables real-time vulnerability detection and automated remediation integrated into a single workflow, eliminating delays from traditional periodic scanning approaches.
Information security
fromSecurityWeek
4 days ago

Juniper Networks Patches Dozens of Junos OS Vulnerabilities

Juniper Networks released patches for multiple vulnerabilities, including severe flaws that could lead to privilege escalation and remote device takeover.
Information security
fromSecurityWeek
4 days ago

Critical Marimo Flaw Exploited Hours After Public Disclosure

A critical vulnerability in Marimo was exploited within hours of its public disclosure, allowing unauthenticated remote code execution.
Information security
fromTechzine Global
4 days ago

Android trojan linked to Cambodia following anomalous DNS spike

A banking Trojan operating from Cambodia registers 35 new domains monthly, targeting users in 21 countries and exploiting fake apps for fraud.
Information security
fromThe Hacker News
5 days ago

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

A new variant of the Phorpiex botnet combines traditional and peer-to-peer communication, facilitating sophisticated malware operations and high-volume spam.
Information security
fromSecurityWeek
5 days ago

Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities

Palo Alto Networks and SonicWall released patches for multiple vulnerabilities, including high-severity bugs that could allow unauthorized access and code execution.
#cups
Information security
fromTheregister
1 week ago

AI agents found vulns in this Linux and Unix print server

Two vulnerabilities in CUPS allow unauthenticated remote code execution and root file overwrite, posing significant security risks in networked environments.
Information security
fromTheregister
1 week ago

AI agents found vulns in this Linux and Unix print server

Two vulnerabilities in CUPS allow unauthenticated remote code execution and root file overwrite, posing significant security risks in networked environments.
Information security
fromThe Hacker News
6 days ago

Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

Anthropic's Project Glasswing uses Claude Mythos to identify and address cybersecurity vulnerabilities, surpassing human capabilities in some instances.
#dns
fromZDNET
1 month ago
Digital life

How to change your DNS service on a Windows PC or Mac - and why you should

fromZDNET
1 month ago
Privacy technologies

How to change your DNS service on a Windows PC or Mac - and why you should

fromZDNET
1 month ago
Digital life

How to change your DNS service on a Windows PC or Mac - and why you should

fromZDNET
1 month ago
Privacy technologies

How to change your DNS service on a Windows PC or Mac - and why you should

Information security
fromTechRepublic
6 days ago

'BlueHammer' Exploit Targets Windows, Potentially Impacting 1 Billion+ Devices

A security researcher released exploit code for a Windows zero-day vulnerability called BlueHammer, allowing privilege escalation without an official Microsoft patch.
Information security
fromSecurityWeek
6 days ago

Hackers Targeting Ninja Forms Vulnerability That Exposes WordPress Sites to Takeover

A critical vulnerability in Ninja Forms allows file uploads that could lead to remote code execution on affected websites.
Information security
fromSecuritymagazine
6 days ago

Ransomware Response: How Businesses Regain Control Under Pressure

Ransomware attacks create urgent pressure, forcing quick decisions and impacting operations, legal obligations, and overall enterprise strategy.
Information security
fromThe Hacker News
6 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
#fortinet
Information security
fromThe Hacker News
1 week ago

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

Fortinet released patches for a critical vulnerability in FortiClient EMS, allowing unauthenticated attackers to execute unauthorized commands.
Information security
fromSecurityWeek
2 weeks ago

Exploitation of Critical Fortinet FortiClient EMS Flaw Begins

Threat actors exploit a critical SQL injection vulnerability in Fortinet FortiClient EMS, allowing remote code execution without authentication.
Information security
fromThe Hacker News
1 week ago

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

Fortinet released patches for a critical vulnerability in FortiClient EMS, allowing unauthenticated attackers to execute unauthorized commands.
Information security
fromSecurityWeek
2 weeks ago

Exploitation of Critical Fortinet FortiClient EMS Flaw Begins

Threat actors exploit a critical SQL injection vulnerability in Fortinet FortiClient EMS, allowing remote code execution without authentication.
#cisco
Information security
fromThe Hacker News
1 week ago

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

Cisco has released critical updates to address vulnerabilities in its Integrated Management Controller and Smart Software Manager On-Prem.
Information security
fromSecurityWeek
1 week ago

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
Information security
fromSecurityWeek
2 weeks ago

Cisco Patches Multiple Vulnerabilities in IOS Software

Cisco released patches for high- and medium-severity vulnerabilities in IOS and IOS XE, primarily to prevent denial-of-service conditions.
Information security
fromThe Hacker News
1 week ago

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

Cisco has released critical updates to address vulnerabilities in its Integrated Management Controller and Smart Software Manager On-Prem.
Information security
fromSecurityWeek
1 week ago

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
Information security
fromSecurityWeek
2 weeks ago

Cisco Patches Multiple Vulnerabilities in IOS Software

Cisco released patches for high- and medium-severity vulnerabilities in IOS and IOS XE, primarily to prevent denial-of-service conditions.
Information security
fromComputerWeekly.com
2 weeks ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
#citrix
fromSecurityWeek
3 weeks ago
Information security

Critical Citrix NetScaler Vulnerability Poised for Exploitation, Security Firms Warn

Citrix released critical patches for vulnerabilities in NetScaler ADC and Gateway, addressing memory leaks and session mixup issues.
fromThe Hacker News
3 weeks ago
Information security

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

Citrix released security updates for critical vulnerabilities in NetScaler ADC and Gateway that could leak sensitive data.
Information security
fromTheregister
2 weeks ago

Citrix NetScaler bug may be multiple flaws in one

In-the-wild exploitation of a critical Citrix NetScaler bug has begun, with attackers actively targeting vulnerable systems within days of its disclosure.
Information security
fromSecurityWeek
2 weeks ago

Exploitation of Fresh Citrix NetScaler Vulnerability Begins

Exploitation of a critical Citrix NetScaler vulnerability began shortly after its public disclosure, with active attempts detected within days.
Information security
fromSecurityWeek
3 weeks ago

Critical Citrix NetScaler Vulnerability Poised for Exploitation, Security Firms Warn

Citrix released critical patches for vulnerabilities in NetScaler ADC and Gateway, addressing memory leaks and session mixup issues.
Information security
fromThe Hacker News
3 weeks ago

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

Citrix released security updates for critical vulnerabilities in NetScaler ADC and Gateway that could leak sensitive data.
Information security
fromSecurityWeek
2 weeks ago

BIND Updates Patch High-Severity Vulnerabilities

ISC released BIND 9 updates to fix four vulnerabilities, including two high-severity bugs that can lead to memory leaks and high CPU consumption.
fromSecurityWeek
2 weeks ago

TP-Link Patches High-Severity Router Vulnerabilities

CVE-2025-15517 allows attackers to bypass authentication and perform actions such as firmware uploads or configuration operations, according to TP-Link's advisory.
Information security
Information security
fromTechzine Global
3 weeks ago

Major warning: Secure your Microsoft environment

CISA warns organizations to strengthen Microsoft Intune security after attackers exploited the platform in a Stryker cyberattack, gaining administrative access and disrupting healthcare operations.
Information security
fromThe Hacker News
3 weeks ago

9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors

Nine critical vulnerabilities in low-cost IP KVM devices from multiple manufacturers allow unauthenticated attackers to gain root access and control compromised systems at the BIOS/UEFI level.
Information security
fromArs Technica
4 weeks ago

Researchers disclose vulnerabilities in IP KVMs from four manufacturers

IP KVMs pose severe network security risks because compromising them enables attackers to bypass system security and access remotely managed servers.
Information security
fromTechzine Global
4 weeks ago

CISA: Wing FTP Server vulnerabilities are being actively exploited

CISA warns of active exploitation of two Wing FTP Server vulnerabilities that can be chained for complete server compromise, with patches available in version 7.4.4.
Information security
fromThe Hacker News
4 weeks ago

CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths

CISA added CVE-2025-47813, a medium-severity information disclosure vulnerability in Wing FTP Server, to its Known Exploited Vulnerabilities catalog due to active exploitation evidence.
Information security
fromSecurityWeek
1 month ago

Critical N8n Vulnerabilities Allowed Server Takeover

Two critical vulnerabilities in n8n allowed unauthenticated remote code execution and sandbox escape, potentially exposing all stored credentials including AWS keys, passwords, OAuth tokens, and API keys.
Information security
fromThe Hacker News
1 month ago

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP released security updates for two critical vulnerabilities enabling arbitrary code execution: CVE-2019-17571 in Quotation Management Insurance and CVE-2026-27685 in NetWeaver Enterprise Portal Administration.
Information security
fromSecurityWeek
1 month ago

Fortinet, Ivanti, Intel Patch High-Severity Vulnerabilities

Fortinet, Ivanti, and Intel released security patches for dozens of vulnerabilities including high-severity bugs enabling arbitrary code execution, privilege escalation, and security bypasses.
Information security
fromBusiness Matters
1 month ago

NCSC Safety Net Retiring: 56% of UK Domains Still Vulnerable to Email Spoofing

UK organizations face a critical cybersecurity gap as NCSC retires Mail Check and Web Check by March 2026, requiring immediate DMARC enforcement adoption to prevent spoofing and phishing attacks.
Information security
fromThe Hacker News
1 month ago

Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure

Chinese threat actor CL-UNK-1068 conducted years-long cyber espionage campaign targeting high-value organizations across aviation, energy, government, law enforcement, pharmaceutical, technology, and telecommunications sectors in South, Southeast, and East Asia.
Information security
fromTheregister
1 month ago

Cisco warns of two more SD-WAN bugs under active attack

Cisco confirms active exploitation of two new vulnerabilities in Catalyst SD-WAN Manager, requiring immediate patching to prevent file overwriting and privilege escalation attacks.
fromSecurityWeek
1 month ago

Cisco Patches Critical Vulnerabilities in Enterprise Networking Products

This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute a variety of scripts and commands that allow root access to the device.
Information security
Information security
fromThe Hacker News
1 month ago

Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

Cisco Catalyst SD-WAN Manager has two actively exploited vulnerabilities allowing file overwrite and information disclosure to authenticated attackers with valid credentials.
Information security
fromThe Hacker News
1 month ago

Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

Multiple attack vectors across network systems, cloud infrastructure, and AI platforms exploit access control gaps, exposed credentials, and trusted service misuse to target high-value sectors.
#freepbx-security
Information security
fromArs Technica
2 months ago

Why has Microsoft been routing example.com traffic to a company in Japan?

Microsoft routed traffic for reserved example.com test subdomains to Sumitomo Electric's sei.co.jp servers due to a network misconfiguration.
#clickfix
Information security
fromTechzine Global
2 months ago

Multiple vulnerabilities found in Anthropic's Git MCP server

Anthropic's reference Git MCP server contained multiple vulnerabilities that allowed arbitrary file access and command execution, exposing the MCP ecosystem to significant security risk.
Information security
fromSecurityWeek
2 months ago

Organizations Warned of Exploited Linux Vulnerabilities

Critical GNU Inetutils telnetd authentication bypass (CVE-2026-24061) enables remote root via crafted Telnet USER variable, and kernel integer overflow (CVE-2018-14634) permits privilege escalation.
Information security
fromTheregister
2 months ago

Cisco finally fixes max-severity bug under attack for weeks

Cisco released updates fixing a maximum-severity AsyncOS vulnerability (CVE-2025-20393) exploited for root access and persistence on SEG and SEWM appliances.
Information security
fromTechzine Global
2 months ago

BeyondTrust Remote Support has a critical vulnerability

Unauthenticated remote-code-execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access enables full system compromise; affected versions require urgent patching or upgrades.
fromTechRepublic
1 month ago

Microsoft: Critical Windows Admin Center Flaw Allows Privilege Escalation

A newly disclosed Windows Admin Center flaw carries a CVSS score of 8.8 and could let an authorized user quietly escalate privileges across enterprise environments. The vulnerability affects WAC version 2.6.4 and, if exploited, may grant sweeping administrative control over the very systems it was built to manage. "Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network," Microsoft said in its advisory.
Information security
Information security
fromSecurityWeek
1 month ago

CISA Warns of Exploited SolarWinds, Notepad++, Microsoft Vulnerabilities

CISA warns multiple newly disclosed vulnerabilities in SolarWinds, Notepad++, and Apple have been exploited in the wild and are added to its KEV list.
Information security
fromTheregister
2 months ago

Mandiant releases credential cracker, to kill bad protocol

Mandiant released rainbow tables that enable Net-NTLMv1 credentials to be cracked within 12 hours on consumer hardware, urging organizations to disable the legacy protocol.
Information security
fromTheregister
2 months ago

Vulnerability exploits now dominate intrusions

Exploit of disclosed vulnerabilities now causes most intrusions, with attackers weaponizing new flaws within hours while many organizations patch slowly.
fromTheregister
2 months ago

Old Windows quirks help punch through new admin defenses

The issue focuses on how Windows handles these directories for specific user sessions. Because the kernel creates a DOS device object directory on demand, rather than at login, it cannot check whether the user is an admin during the creation process. Unlike UAC, Administrator Protection uses a hidden shadow admin account whose token handle can be returned by the system when calling the NtQueryInformationToken API function.
Information security
Information security
fromSecurityWeek
2 months ago

BeyondTrust Patches Critical RCE Vulnerability

Critical unauthenticated RCE (CVE-2026-1731, CVSS 9.9) affects BeyondTrust RS and PRA; patches are available and many internet-accessible on-prem deployments are likely exposed.
Information security
fromTechzine Global
2 months ago

Cloudflare vulnerability made every host accessible

A Cloudflare WAF bypass allowed ACME path requests to reach origin servers, exposing credentials and tokens until Cloudflare implemented a permanent fix.
Information security
fromTheregister
2 months ago

Infosec researchers mull curious case of Telnet ancient flaw

Tier-1 transit operators likely applied port 23 filtering after advance warning of a critical GNU InetUtils telnetd flaw (CVE-2026-24061), collapsing Telnet traffic.
Information security
fromSecurityWeek
2 months ago

Fresh SolarWinds Vulnerability Exploited in Attacks

Threat actors are actively exploiting an unauthenticated deserialization RCE in SolarWinds Web Help Desk (CVE-2025-40551); immediate patching is required.
Information security
fromSecurityWeek
2 months ago

Microsoft Moves Closer to Disabling NTLM

NTLM authentication will be disabled by default in upcoming Windows Server and client releases, requiring explicit re-enablement and migration to Kerberos.
fromArs Technica
2 months ago

Mandiant releases rainbow table that cracks weak admin password in 12 hours

Microsoft released NTLMv1 in the 1980s with the release of OS/2. In 1999, cryptanalyst Bruce Schneier and Mudge published research that exposed key weaknesses in the NTLMv1 underpinnings. At the 2012 Defcon 20 conference, researchers released a tool set that allowed attackers to move from untrusted network guest to admin in 60 seconds, by attacking the underlying weakness. With the 1998 release of Windows NT SP4 in 1998, Microsoft introduced NTLMv2, which fixed the weakness.
Information security
Information security
fromThe Hacker News
2 months ago

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

Vendors released critical security patches across Microsoft, Adobe, SAP, and Intel TDX, addressing actively exploited zero-days, code-injection, authorization flaws, and multiple other vulnerabilities.
[ Load more ]