Tag: exploitation risk

  • Alerts: Microsoft Releases January 2025 Security Updates

    Source URL: https://www.cisa.gov/news-events/alerts/2025/01/14/microsoft-releases-january-2025-security-updates Source: Alerts Title: Microsoft Releases January 2025 Security Updates Feedly Summary: Microsoft released security updates to address vulnerabilities in multiple Microsoft products. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.  CISA encourages users and administrators to review the following and apply necessary updates:…

  • The Register: Crims backdoored the backdoors they supplied to other miscreants. Then the domains lapsed

    Source URL: https://www.theregister.com/2025/01/08/backdoored_backdoors/ Source: The Register Title: Crims backdoored the backdoors they supplied to other miscreants. Then the domains lapsed Feedly Summary: Here’s what $20 gets you these days More than 4,000 unique backdoors are using expired domains and/or abandoned infrastructure, and many of these expose government and academia-owned hosts – thus setting these hosts…

  • The Register: Critical security hole in Apache Struts under exploit

    Source URL: https://www.theregister.com/2024/12/17/critical_rce_apache_struts/ Source: The Register Title: Critical security hole in Apache Struts under exploit Feedly Summary: You applied the patch that could stop possible RCE attacks last week, right? A critical security hole in Apache Struts 2, patched last week, is now being exploited using publicly available proof-of-concept (PoC) code.… AI Summary and Description:…

  • Alerts: CISA Adds One Known Exploited Vulnerability to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2024/12/13/cisa-adds-one-known-exploited-vulnerability-catalog Source: Alerts Title: CISA Adds One Known Exploited Vulnerability to Catalog Feedly Summary: CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.  CVE-2024-50623 Cleo Multiple Products Unrestricted File Upload Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant…

  • Krebs on Security: Patch Tuesday, December 2024 Edition

    Source URL: https://krebsonsecurity.com/2024/12/patch-tuesday-december-2024-edition/ Source: Krebs on Security Title: Patch Tuesday, December 2024 Edition Feedly Summary: Microsoft today released updates to plug at least 70 security holes in Windows and Windows software, including one vulnerability that is already being exploited in active attacks. The zero-day seeing exploitation involves CVE-2024-49138, a security weakness in the Windows Common……

  • The Register: Fully patched Cleo products under renewed ‘zero-day-ish’ mass attack

    Source URL: https://www.theregister.com/2024/12/10/cleo_vulnerability/ Source: The Register Title: Fully patched Cleo products under renewed ‘zero-day-ish’ mass attack Feedly Summary: Thousands of servers targeted while customers wait for patches Researchers at security shop Huntress are seeing mass exploitation of a vulnerability affecting three Cleo file management products, even on patched systems.… AI Summary and Description: Yes Summary:…

  • The Register: Cisco scores a perfect CVSS 10 with critical flaw in its wireless system

    Source URL: https://www.theregister.com/2024/11/07/cisco_uiws_flaw/ Source: The Register Title: Cisco scores a perfect CVSS 10 with critical flaw in its wireless system Feedly Summary: Ultra-Reliable Wireless Backhaul doesn’t live up to its name Cisco is issuing a critical alert notice about a flaw that makes its so-called Ultra-Reliable Wireless Backhaul systems easy to subvert.… AI Summary and…

  • The Register: Samsung phone users under attack, Google warns

    Source URL: https://www.theregister.com/2024/10/24/samsung_phone_eop_attacks/ Source: The Register Title: Samsung phone users under attack, Google warns Feedly Summary: Don’t ignore this nasty zero day exploit says TAG A nasty bug in Samsung’s mobile chips is being exploited by miscreants as part of an exploit chain to escalate privileges and then remotely execute arbitrary code, according to Google…

  • The Register: Warning! FortiManager critical vulnerability under active attack

    Source URL: https://www.theregister.com/2024/10/23/fortimanager_critical_vulnerability/ Source: The Register Title: Warning! FortiManager critical vulnerability under active attack Feedly Summary: Security shop and CISA urge rapid action Fortinet has gone public with news of a critical flaw in its software management platform.… AI Summary and Description: Yes Summary: The text discusses a critical security vulnerability in Fortinet’s FortiManager control…

  • The Register: Mozilla patches critical Firefox vuln that attackers are already exploiting

    Source URL: https://www.theregister.com/2024/10/10/firefixed_mozilla_patches_critical_firefox/ Source: The Register Title: Mozilla patches critical Firefox vuln that attackers are already exploiting Feedly Summary: Firefixed: It’s maintenance time for low-complexity, high-impact security flaw It’s patch time for Firefox fans as Mozilla issues a security advisory for a critical code execution vulnerability in the browser.… AI Summary and Description: Yes Summary:…