The Ninja Forms vulnerability is under active exploitation, enabling unauthenticated takeover of WordPress sites running the popular form builder. The flaw is tracked as CVE-2024-43917. The widely deployed …
Latest in Vulnerabilities & Exploits
-
- Cybersecurity NewsVulnerabilities & Exploits
Ivanti Zero-Day Vulnerabilities in Connect Secure
by CSC Newsby CSC News 3 minutes readIvanti zero-day vulnerabilities in Connect Secure and Policy Secure are being actively exploited, prompting urgent patching and incident response across enterprises. Attackers are chaining flaws for full compromise. …
- Cybersecurity NewsIoT SecurityVulnerabilities & Exploits
Critical Flowise Vulnerability Actively Exploited By Attackers Worldwide
by CSC Newsby CSC News 3 minutes readThe Flowise vulnerability is under active exploitation, with attackers scanning and compromising exposed instances for remote code execution and secret theft. Security teams should act immediately. Verified incidents …
- Cybersecurity NewsVulnerabilities & Exploits
Critical Android Strongbox Vulnerability CVE-2024-31317 Patched By Google
by CSC Newsby CSC News 3 minutes readThe Android Strongbox vulnerability has been fixed by Google with patches for CVE-2024-31317, restoring hardware-backed keystore protections on supported devices. The flaw affects StrongBox Keymaster, which secures cryptographic …
- Cybersecurity NewsVulnerabilities & Exploits
GrafanaGhost Grafana Vulnerability Enables Unauthorized Enterprise Data Access
by CSC Newsby CSC News 3 minutes readGrafana vulnerability researchers disclosed GrafanaGhost (CVE-2024-9264), a flaw that enables unauthorized data access via abused dashboard and data source functions. The issue affects multi-tenant and legacy Grafana environments …
- Cybersecurity NewsVulnerabilities & Exploits
GPUBreach: New GPU Rowhammer Attack Grants Root Shell Access Via AMD Exploit
by CSC Newsby CSC News 3 minutes readGPU rowhammer attack researchers disclosed GPUBreach, a practical technique that flips DRAM bits from the GPU and chains the fault with an AMD driver bug to gain root …
- Cybersecurity NewsRansomwareVulnerabilities & Exploits
Medusa Ransomware Exploits Vulnerabilities In Breached Systems Rapidly
by CSC Newsby CSC News 3 minutes readMedusa Ransomware is increasingly leveraging unpatched vulnerabilities to gain initial access and accelerate enterprise compromise. Recent incident analyses show a clear pivot from email-led intrusion to vulnerability-driven break-ins …
- Cybersecurity NewsVulnerabilities & Exploits
QNAP Vulnerabilities Pwn2Own: Four Critical Flaws Patched In QTS
by CSC Newsby CSC News 2 minutes readQNAP vulnerabilities Pwn2Own prompted urgent action this week as QNAP released firmware updates for four flaws exploited during the contest. The issues impact QTS across numerous NAS models. …
- Cybersecurity NewsVulnerabilities & Exploits
Google Confirms Critical Chrome Security Vulnerabilities Affecting Millions Of Users
by CSC Newsby CSC News 3 minutes readChrome security vulnerabilities prompted a new Google Chrome Stable channel release for Windows, macOS, and Linux, addressing multiple high-severity flaws. Administrators should deploy patches immediately. The update reduces …
- Cybersecurity NewsCompliance & RegulationsIoT SecurityVulnerabilities & Exploits
CISA Adds Critical iOS Security Vulnerabilities To KEV Catalogue
by CSC Newsby CSC News 3 minutes readiOS security vulnerabilities have been added to the CISA KEV catalog following confirmed links to the Coruna exploit kit. The listing indicates active exploitation and available patches. The …