Browsing Tag
Vulnerability
1193 posts
Fake 7-Zip Exploit Code Traced to AI-Generated Misinterpretation
A recent claim that a critical zero-day vulnerability existed in the popular open-source file archiver 7-Zip has been met with skepticism from the software's creator and other security researchers.
January 2, 2025
FortiGuard Labs Links New EC2 Grouper Hackers to AWS Credential Exploits
Researchers at FortiGuard Labs have identified a prolific attacker group known as "EC2 Grouper" who frequently exploits compromised credentials using AWS tools.
January 1, 2025
Exposed Cloud Server Tracks 800,000 Volkswagen, Audi, and Skoda EVs
SUMMARY A recent report from the German news outlet Spiegel has revealed a significant security breach impacting hundreds…
December 30, 2024
Critical Flaw Exposes Four-Faith Routers to Remote Exploitation
SUMMARY: VulnCheck has discovered a critical new vulnerability (CVE-2024-12856) affecting Four-Faith industrial routers (F3x24 and F3x36), with evidence…
December 30, 2024
Postman Workspaces Leak 30000 API Keys and Sensitive Tokens
Thousands of Postman workspaces leaked sensitive data like API keys and tokens. Learn best practices to secure your API development environment and protect your organization
December 24, 2024
Supply Chain Attack Hits Rspack, Vant npm Packages with Monero Miner
Popular npm packages, Rspack and Vant, were recently compromised with malicious code. Learn about the attack, the impact, and how to protect your projects from similar threats.
December 23, 2024
Androxgh0st Botnet Targets IoT Devices, Exploiting 27 Vulnerabilities
Androxgh0st, a botnet targeting web servers since January 2024, is also deploying IoT-focused Mozi payloads, reveals CloudSEK’s latest research.
December 18, 2024
Cl0p Ransomware Exploits Cleo Vulnerability, Threatens Data Leaks
SUMMARY The Cl0p ransomware group has recently claimed responsibility for exploiting a critical vulnerability in Cleo’s managed file…
December 16, 2024
Firmware Security: Identifying Risks to Implement Best Cybersecurity Practices
Find out the key security risks of firmware security: Identify threats, and learn best practices and protection methods…
December 16, 2024
AuthQuake Flaw Allowed MFA Bypass Across Azure, Office 365 Accounts
SUMMARY Cybersecurity researchers at Oasis Security have identified a vulnerability in Microsoft’s Multi-Factor Authentication (MFA), known as AuthQuake,…
December 11, 2024