What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
DarkReading.webp 2025-01-29 22:10:29 PrintNightmare Aftermath: Windows Print Spooler is Better. What\\'s Next? (lien direct) While Microsoft has boosted the security of Windows Print Spooler in the three years since the disclosure of the PrintNightmare vulnerability, the service remains a spooky threat that organizations cannot afford to ignore.
While Microsoft has boosted the security of Windows Print Spooler in the three years since the disclosure of the PrintNightmare vulnerability, the service remains a spooky threat that organizations cannot afford to ignore.
Vulnerability Threat ★★★
DarkReading.webp 2025-01-29 19:54:26 Unpatched Zyxel CPE Zero-Day Pummeled by Cyberattackers (lien direct) VulnCheck initially disclosed the critical command-injection vulnerability (CVE-2024-40891) six months ago, but Zyxel has yet to mention its existence or offer users a patch to mitigate threats.
VulnCheck initially disclosed the critical command-injection vulnerability (CVE-2024-40891) six months ago, but Zyxel has yet to mention its existence or offer users a patch to mitigate threats.
Vulnerability Threat ★★★
DarkReading.webp 2025-01-29 18:03:01 Mirai Variant \\'Aquabot\\' Exploits Mitel Device Flaws (lien direct) Yet another spinoff of the infamous DDoS botnet is exploiting a known vulnerability in active attacks, while its threat actors are promoting it on Telegram for other attackers to use as well, in a DDoS-as-a-service model.
Yet another spinoff of the infamous DDoS botnet is exploiting a known vulnerability in active attacks, while its threat actors are promoting it on Telegram for other attackers to use as well, in a DDoS-as-a-service model.
Vulnerability Threat ★★★
DarkReading.webp 2025-01-28 22:07:14 OAuth Flaw Exposed Millions of Airline Users to Account Takeovers (lien direct) The now-fixed vulnerability involved a major travel services company that\'s integrated with dozens of airline websites worldwide.
The now-fixed vulnerability involved a major travel services company that\'s integrated with dozens of airline websites worldwide.
Vulnerability ★★
DarkReading.webp 2025-01-28 11:46:57 Actively Exploited Fortinet Zero-Day Gives Attackers Super-Admin Privileges (lien direct) The firewall specialist has patched the security flaw, which was responsible for a series of attacks reported earlier this month that compromised FortiOS and FortiProxy products exposed to the public Internet.
The firewall specialist has patched the security flaw, which was responsible for a series of attacks reported earlier this month that compromised FortiOS and FortiProxy products exposed to the public Internet.
Vulnerability Threat ★★★
DarkReading.webp 2025-01-27 22:30:27 Apple Patches Actively Exploited Zero-Day Vulnerability (lien direct) The Apple iOS 18.3 update fixes 28 other vulnerabilities identified by the tech company, though there is little information on them.
The Apple iOS 18.3 update fixes 28 other vulnerabilities identified by the tech company, though there is little information on them.
Vulnerability Threat ★★
DarkReading.webp 2025-01-23 17:57:23 CISA: Ivanti Vulns Chained Together in Cyberattack Onslaught (lien direct) The threat actors are abusing the vulnerabilities to gain initial access, obtain credentials, and install malicious scripts on user devices.
The threat actors are abusing the vulnerabilities to gain initial access, obtain credentials, and install malicious scripts on user devices.
Vulnerability Threat ★★★
DarkReading.webp 2025-01-15 16:51:35 CISA: Second BeyondTrust Vulnerability Added to KEV Catalog (lien direct) BeyondTrust has patched all cloud instances of the vulnerability and has released patches for self-hosted versions.
BeyondTrust has patched all cloud instances of the vulnerability and has released patches for self-hosted versions.
Vulnerability Cloud ★★
DarkReading.webp 2025-01-14 21:45:43 Apple Bug Allows Root Protections Bypass Without Physical Access (lien direct) Emergent macOS vulnerability lets adversaries circumvent Apple\'s System Integrity Protection (SIP) by loading third-party kernels.
Emergent macOS vulnerability lets adversaries circumvent Apple\'s System Integrity Protection (SIP) by loading third-party kernels.
Vulnerability ★★★
DarkReading.webp 2025-01-14 17:50:24 (Déjà vu) Zero-Day Security Bug Likely Fueling Fortinet Firewall Attacks (lien direct) An ongoing campaign targeting FortiGate devices with management interfaces exposed on the public Internet is leading to unauthorized administrative logins and configuration changes, creating new accounts, and performing SSL VPN authentication.
An ongoing campaign targeting FortiGate devices with management interfaces exposed on the public Internet is leading to unauthorized administrative logins and configuration changes, creating new accounts, and performing SSL VPN authentication.
Vulnerability Threat ★★★
DarkReading.webp 2025-01-13 20:44:00 Cloud Attackers Exploit Max-Critical Aviatrix RCE Flaw (lien direct) The security vulnerability tracked as CVE-2024-50603, which rates 10 out of 10 on the CVSS scale, enables unauthenticated remote code execution on affected systems, which cyberattackers are using to plant malware.
The security vulnerability tracked as CVE-2024-50603, which rates 10 out of 10 on the CVSS scale, enables unauthenticated remote code execution on affected systems, which cyberattackers are using to plant malware.
Malware Vulnerability Threat Cloud ★★★
DarkReading.webp 2025-01-06 14:33:58 Will AI Code Generators Overcome Their Insecurities This Year? (lien direct) In just two years, LLMs have become standard for developers - and non-developers - to generate code, but companies still need to improve security processes to reduce software vulnerabilities.
In just two years, LLMs have become standard for developers - and non-developers - to generate code, but companies still need to improve security processes to reduce software vulnerabilities.
Vulnerability ★★★
DarkReading.webp 2025-01-03 22:41:51 Thousands of Buggy BeyondTrust Systems Remain Exposed (lien direct) Weeks after the critical vulnerability was reported and a hacking of the Treasury Department, nearly 9,000 BeyondTrust instances remain wide open to the Internet, researchers say.
Weeks after the critical vulnerability was reported and a hacking of the Treasury Department, nearly 9,000 BeyondTrust instances remain wide open to the Internet, researchers say.
Vulnerability ★★★
DarkReading.webp 2025-01-02 16:28:38 Unpatched Active Directory Flaw Can Crash Any Microsoft Server (lien direct) Windows servers are vulnerable to a dangerous LDAP vulnerability that could be used to crash multiple servers at once and should be patched immediately.
Windows servers are vulnerable to a dangerous LDAP vulnerability that could be used to crash multiple servers at once and should be patched immediately.
Vulnerability ★★
DarkReading.webp 2024-12-26 14:00:00 Emerging Threats & Vulnerabilities to Prepare for in 2025 (lien direct) From zero-day exploits to 5G network vulnerabilities, these are the threats that are expected to persist over the next 12 months.
From zero-day exploits to 5G network vulnerabilities, these are the threats that are expected to persist over the next 12 months.
Vulnerability Threat Prediction ★★★
DarkReading.webp 2024-12-20 19:25:41 How to Protect Your Environment from the NTLM Vulnerability (lien direct) This Tech Tip outlines what enterprise defenders need to do to protect their enterprise environment from the new NTLM vulnerability.
This Tech Tip outlines what enterprise defenders need to do to protect their enterprise environment from the new NTLM vulnerability.
Vulnerability ★★★
DarkReading.webp 2024-12-19 17:46:16 Orgs Scramble to Fix Actively Exploited Bug in Apache Struts 2 (lien direct) A newly discovered vulnerability, CVE-2024-53677, in the aging Apache framework is going to cause major headaches for IT teams, since patching isn\'t enough to fix it.
A newly discovered vulnerability, CVE-2024-53677, in the aging Apache framework is going to cause major headaches for IT teams, since patching isn\'t enough to fix it.
Vulnerability Patching ★★
DarkReading.webp 2024-12-17 16:21:38 Azure Data Factory Bugs Expose Cloud Infrastructure (lien direct) Three vulnerabilities in the service\'s Apache Airflow integration could have allowed attackers to take shadow administrative control over an enterprise cloud infrastructure, gain access to and exfiltrate data, and deploy malware.
Three vulnerabilities in the service\'s Apache Airflow integration could have allowed attackers to take shadow administrative control over an enterprise cloud infrastructure, gain access to and exfiltrate data, and deploy malware.
Malware Vulnerability Cloud ★★
DarkReading.webp 2024-12-13 21:56:35 Cleo MFT Zero-Day Exploits Are About Escalate, Analysts Warn (lien direct) Defenders running the Cleo managed file transfer are urged to be on the lookout for the Cleopatra backdoor and other indicators of an ongoing ransomware campaign, as patching details remain foggy, and no CVE has been issued.
Defenders running the Cleo managed file transfer are urged to be on the lookout for the Cleopatra backdoor and other indicators of an ongoing ransomware campaign, as patching details remain foggy, and no CVE has been issued.
Ransomware Vulnerability Threat Patching ★★
DarkReading.webp 2024-12-11 22:47:17 Chinese Hacker Pwns 81K Sophos Devices With Zero-Day Bug (lien direct) The US State Department has offered a $10 million reward for Guan Tianfeng, who has been accused of developing and testing a critical SQL injection flaw with a CVSS score of 9.8 used in Sophos attacks.
The US State Department has offered a $10 million reward for Guan Tianfeng, who has been accused of developing and testing a critical SQL injection flaw with a CVSS score of 9.8 used in Sophos attacks.
Vulnerability Threat ★★★
DarkReading.webp 2024-12-11 15:50:59 Cybersecurity Lessons From 3 Public Breaches (lien direct) High-profile security incidents provide examples of how common vulnerabilities can be exploited. If you pay attention, you can learn from others\' mistakes.
High-profile security incidents provide examples of how common vulnerabilities can be exploited. If you pay attention, you can learn from others\' mistakes.
Vulnerability ★★★
DarkReading.webp 2024-12-10 22:21:02 Actively Exploited Zero-Day, Critical RCEs Lead Microsoft Patch Tuesday (lien direct) The zero-day (CVE-2024-49138), plus a worryingly critical unauthenticated RCE security vulnerability (CVE-2024-49112), are unwanted gifts for security admins this season.
The zero-day (CVE-2024-49138), plus a worryingly critical unauthenticated RCE security vulnerability (CVE-2024-49112), are unwanted gifts for security admins this season.
Vulnerability Threat ★★★
DarkReading.webp 2024-12-10 21:03:08 \\'Termite\\' Ransomware Likely Behind Cleo Zero-Day Attacks (lien direct) The threat actor group recently took credit for a similar attack on Blue Yonder that affected multiple organizations, including Starbucks.
The threat actor group recently took credit for a similar attack on Blue Yonder that affected multiple organizations, including Starbucks.
Ransomware Vulnerability Threat ★★
DarkReading.webp 2024-12-09 22:42:00 Microsoft NTLM Zero-Day to Remain Unpatched Until April (lien direct) The second zero-day vulnerability found in Windows NTLM in the past two months paves the way for relay attacks and credential theft. Microsoft has no patch, but released updated NTLM cyberattack mitigation advice.
The second zero-day vulnerability found in Windows NTLM in the past two months paves the way for relay attacks and credential theft. Microsoft has no patch, but released updated NTLM cyberattack mitigation advice.
Vulnerability Threat ★★★
DarkReading.webp 2024-12-09 15:00:00 Large-Scale Incidents & the Art of Vulnerability Prioritization (lien direct) We can anticipate a growing number of emerging vulnerabilities in the near future, emphasizing the need for an effective prioritization strategy.
We can anticipate a growing number of emerging vulnerabilities in the near future, emphasizing the need for an effective prioritization strategy.
Vulnerability ★★★
DarkReading.webp 2024-12-05 21:13:03 Bypass Bug Revives Critical N-Day in Mitel MiCollab (lien direct) A single barrier prevented attackers from exploiting a critical vulnerability in an enterprise collaboration platform. Now there\'s a workaround.
A single barrier prevented attackers from exploiting a critical vulnerability in an enterprise collaboration platform. Now there\'s a workaround.
Vulnerability ★★
DarkReading.webp 2024-12-05 15:00:00 Vulnerability Management Challenges in IoT & OT Environments (lien direct) By understanding the unique challenges of protecting IoT and OT devices, organizations can safeguard these critical assets against evolving cyber threats.
By understanding the unique challenges of protecting IoT and OT devices, organizations can safeguard these critical assets against evolving cyber threats.
Vulnerability Industrial ★★
DarkReading.webp 2024-12-04 20:47:06 Veeam Urges Updates After Discovering Critical Vulnerability (lien direct) The vulnerability affects certain versions of the Veeam Service Provider Console that can only be fixed by updating with the latest patch.
The vulnerability affects certain versions of the Veeam Service Provider Console that can only be fixed by updating with the latest patch.
Vulnerability ★★★
DarkReading.webp 2024-12-04 14:01:11 Digital Certificates With Shorter Lifespans Reduce Security Vulnerabilities (lien direct) Proposals from Google and Apple drastically reduce the life cycle of certificates, which should mean more oversight - and hopefully better control.
Proposals from Google and Apple drastically reduce the life cycle of certificates, which should mean more oversight - and hopefully better control.
Vulnerability ★★
DarkReading.webp 2024-12-03 20:25:34 Decade-Old Cisco Vulnerability Under Active Exploit (lien direct) Cisco encourages users to update to an unaffected version of its Adaptive Security Appliance (ASA) software since there are no workarounds for the 2014 vulnerability.
Cisco encourages users to update to an unaffected version of its Adaptive Security Appliance (ASA) software since there are no workarounds for the 2014 vulnerability.
Vulnerability Threat ★★
DarkReading.webp 2024-11-27 13:10:10 News Desk 2024: Can GenAI Write Secure Code? (lien direct) GenAI\'s 30%-50% coding productivity boost comes with a downside - it\'s also generating vulnerabilities. Veracode\'s Chris Wysopal talks about what he finds out in this News Desk interview during Black Hat USA.
GenAI\'s 30%-50% coding productivity boost comes with a downside - it\'s also generating vulnerabilities. Veracode\'s Chris Wysopal talks about what he finds out in this News Desk interview during Black Hat USA.
Vulnerability ★★★★
DarkReading.webp 2024-11-26 21:36:42 \\'RomCom\\' APT Mounts Zero-Day, Zero-Click Browser Escapes in Firefox, Tor (lien direct) The innocuously named Russian-sponsored cyber threat actor has combined critical and serious vulnerabilities in Windows and Firefox products in a zero-click code execution exploit.
The innocuously named Russian-sponsored cyber threat actor has combined critical and serious vulnerabilities in Windows and Firefox products in a zero-click code execution exploit.
Vulnerability Threat ★★★
DarkReading.webp 2024-11-26 16:11:46 CyCognito Report Highlights Rising Cybersecurity Risks in Holiday E-Commerce (lien direct) Findings reveal growing cybersecurity risks in ecommerce, exposing vulnerabilities in PII handling and lack of basic security protections like HTTPS and WAFs
Findings reveal growing cybersecurity risks in ecommerce, exposing vulnerabilities in PII handling and lack of basic security protections like HTTPS and WAFs
Vulnerability ★★
DarkReading.webp 2024-11-22 16:48:01 Leaky Cybersecurity Holes Put Water Systems at Risk (lien direct) At least 97 major water systems in the US have serious cybersecurity vulnerabilities and compliance issues, raising concerns that cyberattacks could disrupt businesses, industry, and the lives of millions of citizens.
At least 97 major water systems in the US have serious cybersecurity vulnerabilities and compliance issues, raising concerns that cyberattacks could disrupt businesses, industry, and the lives of millions of citizens.
Vulnerability ★★
DarkReading.webp 2024-11-20 14:14:02 \\'Water Barghest\\' Sells Hijacked IoT Devices for Proxy Botnet Misuse (lien direct) An elusive, sophisticated cybercriminal group has used known and zero-day vulnerabilities to compromise more than 20,000 SOHO routers and other IoT devices so far, and then puts them up for sale on a residential proxy marketplace for state-sponsored cyber-espionage actors and others to use.
An elusive, sophisticated cybercriminal group has used known and zero-day vulnerabilities to compromise more than 20,000 SOHO routers and other IoT devices so far, and then puts them up for sale on a residential proxy marketplace for state-sponsored cyber-espionage actors and others to use.
Vulnerability Threat ★★
DarkReading.webp 2024-11-18 20:14:15 Critical WordPress Plug-in Flaw Exposes 4M Sites to Takeover (lien direct) A vulnerability found in the Really Simple Security plug-in allows an attacker to remotely gain access to any account on an affected website, including the administrator, when 2FA is enabled.
A vulnerability found in the Really Simple Security plug-in allows an attacker to remotely gain access to any account on an affected website, including the administrator, when 2FA is enabled.
Vulnerability ★★
DarkReading.webp 2024-11-18 17:11:38 Palo Alto Networks Patches Critical Zero-Day Firewall Bug (lien direct) The security vendor\'s Expedition firewall appliance\'s PAN-OS interface tool has racked up four critical security vulnerabilities under active attack in November, leading tit to advise customers to update immediately or and take them off the Internet.
The security vendor\'s Expedition firewall appliance\'s PAN-OS interface tool has racked up four critical security vulnerabilities under active attack in November, leading tit to advise customers to update immediately or and take them off the Internet.
Tool Vulnerability Threat ★★
DarkReading.webp 2024-11-13 22:34:56 Zero-Days Win the Prize for Most Exploited Vulns (lien direct) Among the top exploited zero-day vulnerabilities were bugs found in systems from Citrix and Cisco.
Among the top exploited zero-day vulnerabilities were bugs found in systems from Citrix and Cisco.
Vulnerability Threat ★★★
DarkReading.webp 2024-11-13 19:47:53 Google AI Platform Bugs Leak Proprietary Enterprise LLMs (lien direct) The tech giant fixed privilege-escalation and model-exfiltration vulnerabilities in Vertex AI that could have allowed attackers to steal or poison custom-built AI models.
The tech giant fixed privilege-escalation and model-exfiltration vulnerabilities in Vertex AI that could have allowed attackers to steal or poison custom-built AI models.
Vulnerability ★★★
DarkReading.webp 2024-11-12 22:41:11 2 Zero-Day Bugs in Microsoft\\'s Nov. Update Under Active Exploit (lien direct) The November 2024 Patch Tuesday update contains a substantially high percentage of remote code execution (RCE) vulnerabilities (including a critical issue in Windows Kerberos), and two other zero-day bugs that have been previously disclosed and could soon come under attack.
The November 2024 Patch Tuesday update contains a substantially high percentage of remote code execution (RCE) vulnerabilities (including a critical issue in Windows Kerberos), and two other zero-day bugs that have been previously disclosed and could soon come under attack.
Vulnerability Threat ★★
DarkReading.webp 2024-11-12 16:31:25 Citrix Issues Patches for Zero-Day Recording Manager Bugs (lien direct) There is some disagreement over whether the remote code execution (RCE) security flaws allow for unauthenticated exploitation or not. Citrix says no, but researchers say the company is downplaying a "good old unauthenticated RCE."
There is some disagreement over whether the remote code execution (RCE) security flaws allow for unauthenticated exploitation or not. Citrix says no, but researchers say the company is downplaying a "good old unauthenticated RCE."
Vulnerability Threat ★★★
DarkReading.webp 2024-11-12 15:09:12 Citrix \\'Recording Manager\\' Zero-Day Bug Allows Unauthenticated RCE (lien direct) The unpatched security vulnerability, which doesn\'t have a CVE yet, is due to an exposed Microsoft Message Queuing (MSMQ) instance and the use of the insecure BinaryFormatter.
The unpatched security vulnerability, which doesn\'t have a CVE yet, is due to an exposed Microsoft Message Queuing (MSMQ) instance and the use of the insecure BinaryFormatter.
Vulnerability Threat ★★
DarkReading.webp 2024-11-11 21:13:20 Rat Remcos remanié déployé contre les utilisateurs de Microsoft Windows [Rat Remcos remanié déployé contre les utilisateurs de Microsoft Windows ] (lien direct) Les utilisateurs de Windows sont à risque de prendre un rachat complet des appareils par une version malveillante émergente de l'outil d'administration à distance Remcos, qui est utilisé dans une campagne en cours exploitant une vulnérabilité connue de code à distance (RCE) dans Microsoft Office et WordPad.
Windows users are at risk for full device takeover by an emerging malicious version of the Remcos remote admin tool, which is being used in an ongoing campaign exploiting a known remote code execution (RCE) vulnerability in Microsoft Office and WordPad.
Tool Vulnerability ★★★
DarkReading.webp 2024-11-08 22:16:24 AI & LLMS sont prometteurs dans les bogues logiciels d\\\\\\\\\\\'écrasement (lien direct) Les modèles de grandes langues (LLMS) peuvent aider les entreprises de sécurité des applications à trouver et à corriger les vulnérabilités des logiciels. Les acteurs malveillants sont également sur eux aussi, mais ici \\\\\\\\\\\\\ \ \ est pourquoi les défenseurs peuvent conserver le bord.
Large language models (LLMs) can help app security firms find and fix software vulnerabilities. Malicious actors are on to them too, but here\\\\\\\\\\\\\'s why defenders may retain the edge.
Vulnerability ★★
DarkReading.webp 2024-11-04 15:46:28 Google: L'agent Big Sleep Ai met le bogue logiciel SQLite au lit
Google: Big Sleep AI Agent Puts SQLite Software Bug to Bed
(lien direct)
Un outil de recherche de la société a trouvé une vulnérabilité dans la base de données open source SQLite, démontrant le "potentiel défensif" d'utiliser les LLM pour trouver des vulnérabilités dans les applications avant la libération publique.
A research tool by the company found a vulnerability in the SQLite open source database, demonstrating the "defensive potential" for using LLMs to find vulnerabilities in applications before they\'re publicly released.
Tool Vulnerability ★★★
DarkReading.webp 2024-11-01 01:53:28 L'importance négligé d'identifier les utilisateurs les plus risqués
The Overlooked Importance of Identifying Riskiest Users
(lien direct)
"Voir un, enseigner un, faire un" retire une page du manuel de santé pour réduire les vulnérabilités humaines où ils comptent le plus en cybersécurité.
"See one, teach one, do one" takes a page out of the healthcare playbook to reduce human vulnerabilities where they matter most in cybersecurity.
Vulnerability Medical ★★
DarkReading.webp 2024-10-29 21:58:44 La faille Windows récurrente pourrait exposer les informations d'identification des utilisateurs
Recurring Windows Flaw Could Expose User Credentials
(lien direct)
Maintenant un jour zéro, la vulnérabilité permet le vol de hachage NTLM, un problème que Microsoft a déjà résolu deux fois auparavant.
Now a zero-day, the vulnerability enables NTLM hash theft, an issue that Microsoft has already fixed twice before.
Vulnerability Threat ★★
DarkReading.webp 2024-10-28 23:04:44 Sophos-SecureWorks Deal se concentre sur la construction de la plate-forme avancée MDR, XDR
Sophos-SecureWorks Deal Focuses on Building Advanced MDR, XDR Platform
(lien direct)
Le PDG de Sophos, Joe Levy, a déclaré que 859 millions de dollars en accord pour acquérir SecureWorks auprès du propriétaire majoritaire Dell Technologies mettront la plate-forme Taegis - avec détection et réponse du réseau, détection et réponse de vulnérabilité, et les capacités de détection et de réponse des menaces d'identité - au cœur.
Sophos CEO Joe Levy says $859 million deal to acquire SecureWorks from majority owner Dell Technologies will put the Taegis platform - with network detection and response, vulnerability detection and response, and identity threat detection and response capabilities - at the core.
Vulnerability Threat ★★
DarkReading.webp 2024-10-24 22:22:36 L'outil LLM open source renifle Python Zero-Days
Open Source LLM Tool Sniffs Out Python Zero-Days
(lien direct)
VulnHunttr est un analyseur de code statique Python utilisant Claude AI pour trouver et expliquer les vulnérabilités complexes et multi-étapes.
Vulnhuntr is a Python static code analyzer using Claude AI to find and explain complex, multistep vulnerabilities.
Tool Vulnerability ★★★★
DarkReading.webp 2024-10-23 20:55:13 Le groupe Lazarus exploite Chrome Zero-Day dans la dernière campagne
Lazarus Group Exploits Chrome Zero-Day in Latest Campaign
(lien direct)
L'acteur nord-coréen va après les investisseurs de crypto-monnaie dans le monde entier en tirant parti d'un site de jeu d'aspect authentique et d'un contenu et d'images générés par l'IA.
The North Korean actor is going after cryptocurrency investors worldwide leveraging a genuine-looking game site and AI-generated content and images.
Vulnerability Threat APT 38 ★★
Last update at: 2025-05-10 14:07:21
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter