FreshRSS

๐Ÿ”’
โŒ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
โ˜ โ˜† โœ‡ The Hacker News

CISA Warns of Actively Exploited Apache Flink Security Vulnerability

By: Newsroom โ€” May 23rd 2024 at 16:44
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting Apache Flink, an open-source, unified stream-processing and batch-processing framework, to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2020-17519, the issue relates to a case of improper access control that
โ˜ โ˜† โœ‡ The Hacker News

NextGen Healthcare Mirth Connect Under Attack - CISA Issues Urgent Warning

By: Newsroom โ€” May 21st 2024 at 07:13
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a security flaw impacting NextGen Healthcare Mirth Connect to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The flaw, tracked as CVE-2023-43208 (CVSS score: N/A), concerns a case of unauthenticated remote code execution arising from an incomplete
โ˜ โ˜† โœ‡ The Hacker News

(Cyber) Risk = Probability of Occurrence x Damage

By: The Hacker News โ€” May 15th 2024 at 11:38
Hereโ€™s How to Enhance Your Cyber Resilience with CVSS In late 2023, the Common Vulnerability Scoring System (CVSS) v4.0 was unveiled, succeeding the eight-year-old CVSS v3.0, with the aim to enhance vulnerability assessment for both industry and the public. This latest version introduces additional metrics like safety and automation to address criticism of lacking granularity while
โ˜ โ˜† โœ‡ The Hacker News

Critical F5 Central Manager Vulnerabilities Allow Enable Full Device Takeover

By: Newsroom โ€” May 9th 2024 at 06:11
Two security vulnerabilities have been discovered in F5 Next Central Manager that could be exploited by a threat actor to seize control of the devices and create hidden rogue administrator accounts for persistence. The remotely exploitable flaws "can give attackers full administrative control of the device, and subsequently allow attackers to create accounts on any F5 assets managed by the Next
โ˜ โ˜† โœ‡ The Hacker News

Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites

By: Newsroom โ€” May 8th 2024 at 07:03
A high-severity flaw impacting the LiteSpeed Cache plugin for WordPress is being actively exploited by threat actors to create rogue admin accounts on susceptible websites. The findings come from WPScan, which said that the vulnerability (CVE-2023-40000, CVSS score: 8.3) has been leveraged to set up bogus admin users with the names wpsuppโ€‘user 
โ˜ โ˜† โœ‡ The Hacker News

Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included

By: Newsroom โ€” April 10th 2024 at 04:57
Microsoft has released security updates for the month of April 2024 to remediate a record 149 flaws, two of which have come under active exploitation in the wild. Of the 149 flaws, three are rated Critical, 142 are rated Important, three are rated Moderate, and one is rated Low in severity. The update is aside from 21 vulnerabilities that the company addressed in its
โ˜ โ˜† โœ‡ The Hacker News

Critical Security Flaw Found in Popular LayerSlider WordPress Plugin

By: Newsroom โ€” April 3rd 2024 at 05:11
A critical security flaw impacting the LayerSlider plugin for WordPress could be abused to extract sensitive information from databases, such as password hashes. The flaw, designated as CVE-2024-2879, carries a CVSS score of 9.8 out of a maximum of 10.0. It has been described as a case of SQL injection impacting versions from 7.9.11 through 7.10.0. The issue has been addressed in version
โ˜ โ˜† โœ‡ The Hacker News

Detecting Windows-based Malware Through Better Visibility

By: The Hacker News โ€” April 1st 2024 at 11:20
Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren't just an inconvenience that hurt businesses and end users - they damage the economy, endanger lives, destroy businesses and put national security at risk. But if that wasnโ€™t enough โ€“ North Korea appears to be using revenue from cyber
โ˜ โ˜† โœ‡ The Hacker News

New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking

By: Newsroom โ€” March 29th 2024 at 10:49
Details have emerged about a vulnerability impacting the "wall" command of the util-linux package that could be potentially exploited by a bad actor to leak a user's password or alter the clipboard on certain Linux distributions. The bug, tracked as CVE-2024-28085, has been codenamed WallEscape by security researcher Skyler Ferrante. It has been described as a case of improper
โ˜ โ˜† โœ‡ The Hacker News

Implementing Zero Trust Controls for Compliance

By: The Hacker News โ€” March 22nd 2024 at 11:28
The ThreatLockerยฎ Zero Trust Endpoint Protection Platform implements a strict deny-by-default, allow-by-exception security posture to give organizations the ability to set policy-based controls within their environment and mitigate countless cyber threats, including zero-days, unseen network footholds, and malware attacks as a direct result of user error. With the capabilities of the
โ˜ โ˜† โœ‡ The Hacker News

Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool

By: Newsroom โ€” March 18th 2024 at 12:58
Fortra has released details of a now-patched critical security flaw impacting its FileCatalyst file transfer solution that could allow unauthenticated attackers to gain remote code execution on susceptible servers. Tracked as CVE-2024-25153, the shortcoming carries a CVSS score of 9.8 out of a maximum of 10. "A directory traversal within the 'ftpservlet' of the FileCatalyst Workflow
โ˜ โ˜† โœ‡ The Hacker News

CISA Warns of Actively Exploited JetBrains TeamCity Vulnerability

By: Newsroom โ€” March 8th 2024 at 06:13
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting JetBrains TeamCity On-Premises software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2024-27198 (CVSS score: 9.8), refers to an authentication bypass bug that allows for a complete
โ˜ โ˜† โœ‡ The Hacker News

New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks

By: Newsroom โ€” February 27th 2024 at 10:18
Cybersecurity researchers have found that it's possible to compromise the Hugging Face Safetensors conversion service to ultimately hijack the models submitted by users and result in supply chain attacks. "It's possible to send malicious pull requests with attacker-controlled data from the Hugging Face service to any repository on the platform, as well as hijack any models that are submitted
โ˜ โ˜† โœ‡ The Hacker News

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

By: Newsroom โ€” February 9th 2024 at 16:32
The operators of Raspberry Robin are now using two new one-day exploits to achieve local privilege escalation, even as the malware continues to be refined and improved to make it stealthier than before. This means that "Raspberry Robin has access to an exploit seller or its authors develop the exploits themselves in a short period of time," Check Point said in a report this
โ˜ โ˜† โœ‡ The Hacker News

Fortinet Warns of Critical FortiOS SSL VPN Flaw Likely Under Active Exploitation

By: Newsroom โ€” February 9th 2024 at 07:45
Fortinet has disclosed a new critical security flaw in FortiOS SSL VPN that it said is likely being exploited in the wild. The vulnerability, CVE-2024-21762 (CVSS score: 9.6), allows for the execution of arbitrary code and commands. "An out-of-bounds write vulnerability [CWE-787] in FortiOS may allow a remote unauthenticated attacker to execute arbitrary code or command via specially
โ˜ โ˜† โœ‡ The Hacker News

Mastodon Vulnerability Allows Hackers to Hijack Any Decentralized Account

By: Newsroom โ€” February 3rd 2024 at 06:51
The decentralized social network Mastodon has disclosed a critical security flaw that enables malicious actors to impersonate and take over any account. "Due to insufficient origin validation in all Mastodon, attackers can impersonate and take over any remote account," the maintainers said in a terse advisory. The vulnerability, tracked as CVE-2024-23832, has a severity rating of 9.4 out of
โ˜ โ˜† โœ‡ The Hacker News

URGENT: Upgrade GitLab - Critical Workspace Creation Flaw Allows File Overwrite

By: Newsroom โ€” January 30th 2024 at 16:18
GitLab once again released fixes to address a critical security flaw in its Community Edition (CE) and Enterprise Edition (EE) that could be exploited to write arbitrary files while creating a workspace. Tracked as CVE-2024-0402, the vulnerability has a CVSS score of 9.9 out of a maximum of 10. "An issue has been discovered in GitLab CE/EE affecting all versions from 16.0 prior to
โ˜ โ˜† โœ‡ The Hacker News

Top Security Posture Vulnerabilities Revealed

By: The Hacker News โ€” January 30th 2024 at 10:49
Each New Year introduces a new set of challenges and opportunities for strengthening our cybersecurity posture. It's the nature of the field โ€“ the speed at which malicious actors carry out advanced persistent threats brings a constant, evolving battle for cyber resilience. The excitement in cybersecurity lies in this continuous adaptation and learning, always staying one step ahead of potential
โ˜ โ˜† โœ‡ The Hacker News

Critical Jenkins Vulnerability Exposes Servers to RCE Attacks - Patch ASAP!

By: Newsroom โ€” January 25th 2024 at 11:57
The maintainers of the open-source continuous integration/continuous delivery and deployment (CI/CD) automation software Jenkins have resolved nine security flaws, including a critical bug that, if successfully exploited, could result in remote code execution (RCE). The issue, assigned the CVE identifier CVE-2024-23897, has been described as an arbitrary file read vulnerability through the
โ˜ โ˜† โœ‡ The Hacker News

Cisco Fixes High-Risk Vulnerability Impacting Unity Connection Software

By: Newsroom โ€” January 11th 2024 at 04:55
Cisco has released software updates to address a critical security flaw impacting Unity Connection that could permit an adversary to execute arbitrary commands on the underlying system. Tracked as CVE-2024-20272 (CVSS score: 7.3), the vulnerability is an arbitrary file upload bug residing in the web-based management interface and is the result of a lack of authentication in a specific
โ˜ โ˜† โœ‡ The Hacker News

CISA Flags 6 Vulnerabilities - Apple, Apache, Adobe, D-Link, Joomla Under Attack

By: Newsroom โ€” January 10th 2024 at 04:50
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added six security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. This includes CVE-2023-27524 (CVSS score: 8.9), a high-severity vulnerability impacting the Apache Superset open-source data visualization software that could enable remote code execution.
โ˜ โ˜† โœ‡ The Hacker News

New Terrapin Flaw Could Let Attackers Downgrade SSH Protocol Security

By: Newsroom โ€” January 1st 2024 at 09:37
Security researchers from Ruhr University Bochum have discovered a vulnerability in the Secure Shell (SSH) cryptographic network protocol that could allow an attacker to downgrade the connection's security by breaking the integrity of the secure channel. Called Terrapin (CVE-2023-48795, CVSS score: 5.9), the exploit has been described as the "first ever practically exploitable prefix
โ˜ โ˜† โœ‡ The Hacker News

Apple Releases Security Updates to Patch Critical iOS and macOS Security Flaws

By: Newsroom โ€” December 12th 2023 at 06:44
Apple on Monday released security patches for iOS, iPadOS, macOS, tvOS, watchOS, and Safari web browser to address multiple security flaws, in addition to backporting fixes for two recently disclosed zero-days to older devices. This includes updates for 12 security vulnerabilities in iOS and iPadOS spanning AVEVideoEncoder, ExtensionKit, Find My, ImageIO, Kernel, Safari
โ˜ โ˜† โœ‡ The Hacker News

Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers

By: Newsroom โ€” December 6th 2023 at 10:10
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of a high-severity Adobe ColdFusion vulnerability by unidentified threat actors to gain initial access to government servers. "The vulnerability in ColdFusion (CVE-2023-26360) presents as an improper access control issue and exploitation of this CVE can result in arbitrary code execution,"
โ˜ โ˜† โœ‡ The Hacker News

6 Steps to Accelerate Cybersecurity Incident Response

By: The Hacker News โ€” November 23rd 2023 at 10:48
Modern security tools continue to improve in their ability to defend organizationsโ€™ networks and endpoints against cybercriminals. But the bad actors still occasionally find a way in. Security teams must be able to stop threats and restore normal operations as quickly as possible. Thatโ€™s why itโ€™s essential that these teams not only have the right tools but also understand how to effectively
โ˜ โ˜† โœ‡ The Hacker News

CISA Adds Three Security Flaws with Active Exploitation to KEV Catalog

By: Newsroom โ€” November 17th 2023 at 05:57
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog based on evidence of active exploitation in the wild. Theย vulnerabilitiesย are as follows - CVE-2023-36584ย (CVSS score: 5.4) - Microsoft Windows Mark-of-the-Web (MotW) Security Feature Bypass Vulnerability CVE-2023-1671ย (CVSS score: 9.8) -
โ˜ โ˜† โœ‡ The Hacker News

Alert: 'Effluence' Backdoor Persists Despite Patching Atlassian Confluence Servers

By: Newsroom โ€” November 10th 2023 at 08:58
Cybersecurity researchers have discovered a stealthy backdoor namedย Effluenceย that's deployed following the successful exploitation of a recently disclosed security flaw in Atlassian Confluence Data Center and Server. "The malware acts as a persistent backdoor and is not remediated by applying patches to Confluence," Aon's Stroz Friedberg Incident Response Servicesย saidย in an analysis published
โ˜ โ˜† โœ‡ The Hacker News

The 4 Keys to Building Cloud Security Programs That Can Actually Shift Left

By: The Hacker News โ€” July 27th 2023 at 11:25
As cloud applications are built, tested and updated, they wind their way through an ever-complex series of different tools and teams. Across hundreds or even thousands of technologies that make up the patchwork quilt of development and cloud environments, security processes are all too often applied in only the final phases of software development.ย  Placing security at the very end of the
โ˜ โ˜† โœ‡ The Hacker News

Identifying a Patch Management Solution: Overview of Key Criteria

By: The Hacker News โ€” May 17th 2023 at 11:54
Software is rarely a one-and-done proposition. In fact, any application available today will likely need to be updated โ€“ or patched โ€“ to fix bugs,ย address vulnerabilities, and update key features at multiple points in the future. With the typical enterprise relying on a multitude of applications, servers, and end-point devices in their day-to-day operations, the acquisition of a robustย patch
โŒ