Skip to content

Vulnerabilities

Discussion related to Vulnerabilities

370 Topics 370 Posts
  • 0 Votes
    1 Posts
    87 Views
    CerberusC

    A supply-chain attack could have siphoned sensitive information out of Jira, such as security issues on Atlassian cloud, Bitbucket and on-prem products.

    https://threatpost.com/atlassian-bugs-could-have-led-to-1-click-takeover/167203/

  • 0 Votes
    1 Posts
    136 Views
    CerberusC

    Remote, unauthenticated cyberattackers can infiltrate and take over the Cortex XSOAR platform, which anchors unified threat intelligence and incident responses.

    https://threatpost.com/critical-palo-alto-bug-remote-war-room/167169/

  • 0 Votes
    1 Posts
    97 Views
    CerberusC

    A year-old proof-of-concept attack that allows an attacker to bypass TLS email protections to snoop on messages has been patched.

    https://threatpost.com/email-bug-message-snooping-credential-theft/167125/

  • 0 Votes
    1 Posts
    99 Views
    CerberusC

    These code bombs lurk in the PyPI package repository, waiting to be inadvertently baked into software developers’ applications.

    https://threatpost.com/cryptominers-python-supply-chain/167135/

  • 0 Votes
    1 Posts
    94 Views
    CerberusC

    Company finally rolls out the complete fix this week for an RCE flaw affecting some 800,000 devices that could result in crashes or prevent users from connecting to corporate resources.

    https://threatpost.com/sonicwall-botches-critical-vpn-bug/167152/

  • 0 Votes
    1 Posts
    114 Views
    CerberusC

    A pair of zero-days affecting Pling-based marketplaces could allow for some ugly attacks on unsuspecting Linux enthusiasts – with no patches in sight.

    https://threatpost.com/unpatched-linux-marketplace-bugs-rce/167155/

  • 0 Votes
    1 Posts
    157 Views
    CerberusC

    An attacker with initial physical access (say, at a gym) could gain root entry to the interactive tablet, making for a bevy of remote attack scenarios.

    https://threatpost.com/peloton-bike-bug-hackers-control/166960/

  • 0 Votes
    1 Posts
    126 Views
    CerberusC

    Hank Schless, senior manager of security solutions at Lookout, notes basic steps that organizations can take to protect themselves as ransomware gangs get smarter.

    https://threatpost.com/takeaways-colonial-pipeline-ransomware/166980/

  • 0 Votes
    1 Posts
    122 Views
    CerberusC

    The intro-level networking gear for SMBs could allow remote attacks designed to steal information, drop malware and disrupt operations.

    https://threatpost.com/cisco-smart-switches-security-holes/167031/

  • 0 Votes
    1 Posts
    150 Views
    CerberusC

    What’s the low-hanging fruit for ransomware attackers? What steps could help to fend them off, and what’s stopping organizations from implementing those steps?

    https://threatpost.com/ransomware-sitting-duck/167040/