Cybersecurity researchers have recently uncovered malicious PyPI packages stealing keystrokes and hijacking social accounts. These packages, hosted on the Python Package Index (PyPI), targeted unsuspecting developers and compromised …
Latest in Vulnerabilities & Exploits
-
-
Vulnerabilities & Exploits
Top Cybersecurity Threats: Understanding Critical Security Vulnerabilities
by Clement Brako Akomea 18 minutes readCybersecurity threats are a big deal in today’s digital world and understanding critical security vulnerabilities is imperative. The fact is, they can affect anyone, from big corporations to …
-
News & ResourcesVulnerabilities & Exploits
Sophos Firewall Flaws Fixed to Prevent Critical Remote Exploits
by CSC Newsby CSC News 2 minutes readSophos Firewall Flaws Fixed: Sophos has identified and addressed critical vulnerabilities in its Sophos Firewall product, which posed significant risks to systems worldwide. The vulnerabilities included remote code …
-
Vulnerabilities & ExploitsNews & Resources
Fortinet Critical Vulnerability Patch: Immediate Patch for Critical FortiWLM Vulnerability
by Clement Brako Akomea 2 minutes readThe Fortinet Critical Vulnerability Patch for FortiWLM addresses a severe security flaw, CVE-2023-34990, that could lead to unauthorized administrative access and system exploitation. This vulnerability, rated 9.6/10 on …
-
News & ResourcesVulnerabilities & Exploits
BeyondTrust Critical PRA and RS Vulnerability: Patches Urged
by CSC Newsby CSC News 2 minutes readThe “BeyondTrust critical PRA and RS vulnerability” has raised alarm in the cybersecurity world. This severe flaw, tracked as CVE-2024-12356 with a CVSS score of 9.8, poses significant …
-
News & ResourcesVulnerabilities & Exploits
CISA and FBI Warn About Exploited Flaws and HiatusRAT Campaign
by CSC Newsby CSC News 2 minutes readThe exploited flaws and HiatusRAT campaign have triggered heightened alerts from CISA and the FBI, urging organizations to act quickly. These vulnerabilities pose significant threats, with active exploitation …
-
News & ResourcesVulnerabilities & Exploits
Undocumented DrayTek Vulnerabilities Used in Ransomware Attacks
by CSC Newsby CSC News 2 minutes readThe exploitation of undocumented DrayTek vulnerabilities has emerged as a serious cybersecurity threat, compromising over 300 organizations worldwide. Cybercriminals have leveraged these flaws, including a potential zero-day vulnerability, …
-
News & ResourcesVulnerabilities & Exploits
Microsoft Fixes Critical Windows Defender and Update Catalog Vulnerabilities
by Penelope Iroko 2 minutes readMicrosoft has addressed two critical vulnerabilities in Windows Defender and Update Catalog, ensuring users remain protected from potential cyber threats. These vulnerabilities could have led to information exposure …
-
News & ResourcesVulnerabilities & Exploits
Cleo Vulnerability Exploitation Linked to Termite Ransomware Group
by Penelope Iroko 2 minutes readCybersecurity experts have revealed a major security flaw in Cleo’s file transfer tools that has been actively exploited by a new ransomware group known as Termite. This Cleo …
-
News & ResourcesVulnerabilities & Exploits
AMD Processor Vulnerability Attack: $10 BadRAM Exploit Exposed
by Penelope Iroko 2 minutes readImagine a world where just $10 of off-the-shelf equipment could bypass advanced processor protections. That’s exactly what researchers have revealed with the AMD processor vulnerability attack, a groundbreaking …