#vulnerabilities

[ follow ]
fromTechzine Global
3 days ago

Intel data breach: employee data could be accessed via API

Intel's internal site vulnerabilities exposed data of approximately 270,000 employees due to weak security practices.
#cybersecurity
Privacy technologies
fromThe Hacker News
1 week ago

Linux-Based Lenovo Webcams' Flaw Can Be Remotely Exploited for BadUSB Attacks

Lenovo webcams have vulnerabilities allowing remote attackers to perform keystroke injections and execute commands independently of the operating system.
Privacy professionals
fromThe Hacker News
2 weeks ago

CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials

Vulnerabilities in CyberArk and HashiCorp vaults enable severe security risks, including identity theft and remote code execution.
Information security
fromSecurityWeek
1 week ago

Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution

Xerox patched two serious vulnerabilities in FreeFlow Core that allow remote attackers to execute arbitrary code.
fromDevOps.com
1 week ago

Sonar Surfaces Multiple Caveats When Relying on LLMs to Write Code - DevOps.com

Large language models generate syntactically correct code but introduce significant security vulnerabilities.
fromInfoQ
5 days ago

Java News Roundup: Spring Framework, Spring Data, Open Liberty, Hibernate Reactive, Quarkus, Gradle

Java development continues to evolve with major releases and updates in frameworks and libraries.
fromArs Technica
1 week ago

Encryption made for police and military radios may be easily cracked

At least one implementation of the end-to-end encryption solution endorsed by ETSI has a similar issue that makes it equally vulnerable to eavesdropping.
Privacy technologies
Artificial intelligence
fromNextgov.com
2 weeks ago

DARPA unveils winners of AI challenge to boost critical infrastructure cybersecurity

AI Cyber Challenge announced winners focusing on AI models for identifying and patching vulnerabilities in critical infrastructure code.
Apple
fromstupidDOPE | Est. 2008
2 weeks ago

Update Your iPhone Now: iOS 18.6 Patches 29 Serious Security Flaws | stupidDOPE | Est. 2008

iOS 18.6 is crucial for iPhone security, fixing 29 vulnerabilities, particularly in Safari and WebKit.
fromTheregister
2 weeks ago

CISA releases malware analysis for Sharepoint Server attack

CISA analysed six files including two Dynamic Link-Library (.DLL), one cryptographic key stealer, and three web shells. Cyber threat actors could leverage this malware to steal cryptographic keys and execute a Base64-encoded PowerShell command to fingerprint host system and exfiltrate data.
Privacy professionals
fromZDNET
2 weeks ago

Claude Code makes it easy to trigger a code check now with this simple command

Automated security reviews in Claude Code help ensure code safety.
fromTheregister
2 weeks ago

Nvidia patches bug chain leading to total Triton takeover

The first vulnerability (CVE-2025-23320 - 7.5) relates to a bug in the Python backend, triggered by exceeding the shared memory limit, using a very large request.
Information security
#ai
fromDevOps.com
2 weeks ago
Artificial intelligence

Cycode Delivers AI Agent to Assess How Exploitable Vulnerabilities Are - DevOps.com

fromDevOps.com
2 weeks ago
Artificial intelligence

Cycode Delivers AI Agent to Assess How Exploitable Vulnerabilities Are - DevOps.com

#ai-security
fromInfoQ
2 weeks ago
Privacy technologies

"A Security Nightmare": Docker Warns of Risks in MCP Toolchains

fromInfoQ
2 weeks ago
Privacy technologies

"A Security Nightmare": Docker Warns of Risks in MCP Toolchains

fromTheregister
3 weeks ago

Blame a leak for Microsoft SharePoint attacks: researcher

A leak happened here somewhere,” Dustin Childs, head of threat awareness at Trend Micro's Zero Day Initiative (ZDI), told The Register. “And now you’ve got a zero-day exploit in the wild, and worse than that, you’ve got a zero-day exploit in the wild that bypasses the patch, which came out the next day.
Privacy professionals
#sharepoint
#microsoft
fromZDNET
1 month ago
Information security

Microsoft fixes two SharePoint zero-days under attack, but one is still unresolved - how to patch

fromZDNET
1 month ago
Information security

Microsoft fixes two SharePoint zero-days under attack, but one is still unresolved - how to patch

fromForbes
1 month ago

Security Debt Is The New Tech Debt-And It's Already Compounding

Accumulation of unaddressed vulnerabilities and misconfigurations leads to security debt, which poses significant risks to organizations.
#cisco
fromSecuritymagazine
1 month ago

Proximity Cards Are a Liability: The Urgent Beed to Modernize Access Control

Data compromises have reached over 1.3 billion individuals in 2024, with vulnerabilities primarily linked to initial access.
fromTechzine Global
1 month ago

Chinese cyber espionage groups target strategic sectors

In the first half of 2025, it was observed that groups affiliated with China targeted key sectors like telecommunications and semiconductors through advanced cyber espionage activities.
Privacy professionals
fromTechzine Global
1 month ago

An average of 131 CVE reports per day

The number of CVE reports is projected to exceed 40,000 in 2025, with an average of 131 reports per day observed in early 2025.
Information security
fromSecuritymagazine
1 month ago

Sudo Vulnerability Discovered, May Exposes Linux Systems

CVE-2025-32462 has received a lower CVSS score due to the conditions that are needed. Namely, successful execution would require someone to make a misconfiguration and deploy a Sudoers file with an incorrect host for this vulnerability to work.
Privacy professionals
fromArs Technica
1 month ago

Critical CitrixBleed 2 vulnerability has been under active exploit for weeks

Cybersecurity researchers revealed that a critical vulnerability, CVE-2025-5777, in Citrix network management devices has been exploited for over a month, contradicting Citrix's claims.
Privacy professionals
fromForbes
4 months ago

Hackers Bypass Windows Defender Security - What You Need To Know

Bobby Cooke from IBM X-Force Red confirmed that the Microsoft Teams application was 'a viable WDAC bypass,' demonstrating significant security vulnerabilities in Windows Defender.
Information security
Online Community Development
fromIT Pro
1 month ago

MCP servers used by developers and 'vibe coders' are riddled with vulnerabilities - here's what you need to know

MCP servers are highly vulnerable due to their misconfiguration, risking sensitive assets and enabling unauthorized remote access.
The prevalence of vulnerabilities such as 'NeighborJack' highlights the need for better security measures in MCP server deployments.
fromIndependent
1 month ago

David W Higgins: No, we're not on the cusp of WWIII, but that doesn't mean I'd rule out the possibility of ration cards

Investing in vulnerabilities is wiser than boosting defense spending.
Nuclear weapons development resembles a plot from a spy thriller.
Two nuclear detonations in history highlight the grave risks.
fromTheregister
2 months ago

Former US Army Sergeant admits he sold secrets to China

A former US Army sergeant pled guilty to trying to sell classified data to China after exploiting his top-secret clearance.
Information security
fromThe Hacker News
2 months ago

Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

Over 20 configuration vulnerabilities in Salesforce Industry Cloud expose sensitive data to unauthorized access.
Information security
fromArs Technica
2 months ago

Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them.

Microsoft patched a critical Secure Boot vulnerability that enables malware installation before OS loading, affecting over 50 device manufacturers.
fromZero Day Initiative
2 months ago

Zero Day Initiative - The June 2025 Security Update Review

Adobe's June 2025 updates address 254 CVEs across multiple products, prioritizing those in Commerce and introducing a substantial fix for Experience Manager, despite no known exploits.
Web frameworks
Information security
fromDevOps.com
2 months ago

Survey Surfaces Uneven Adoption of SBOMs to Secure Software - DevOps.com

Many organizations are struggling to meet SBOM requirements and integrate necessary tools.
A significant majority believe AI can improve security visibility but also raise new risks.
[ Load more ]