Vulnerability

LATEST

Windows Server 1 Hero Approved

CISA Advises Federal Agencies to Patch Windows LSA Flaw Affecting Domain Controllers

Back in May, the Cybersecurity & Infrastructure Security Agency (CISA) temporarily removed a Windows flaw from its Known Exploited Vulnerability (KEV) Catalog due to Active Directory (AD) certificate authentication issues. CISA has now re-added the security vulnerability to KEV, and it’s encouraging IT admins to patch it by deploying the June Patch Tuesday updates by…

View Article
Security

CISA Warns Unpatched VMware Servers Remain Vulnerable to Log4Shell

The US Cybersecurity and Infrastructure Agency (CISA) has warned that attackers are still exploiting the Log4Shell flaw to target VMware’s Horizon and Unified Access Gateway (UAG) servers. The security agency advised IT admins to immediately patch their servers running vulnerable Log4j versions. The Apache Software Foundation first disclosed the Log4Shell flaw, tracked as CVE-2021-44228, back…

View Article
Network Security

QNAP Releases Patch to Fix PHP Security Flaw Affecting Select NAS Devices

QNAP has released a patch to address a new PHP security vulnerability that affects specific configurations of its Network Attached Storage (NAS) devices. The company has urged its customers to update their systems to protect against remote code execution (RCE) attacks. Tracked as CVE-2019-11043, the security flaw was first reported to QNAP three years ago,…

View Article
Security

Qbot Malware Operators Exploit Windows MSDT Zero-Day Flaw to Infect PCs

Cybersecurity researchers have found that attackers are exploiting the recently discovered Windows zero-day flaw dubbed “Follina” to infect victims’ computers with Qbot malware. Qbot operators have also teamed up with the Black Basta group to spread ransomware. Qbot, also known as QuakBot QakBot, and Pinkslipbot, was first identified in 2008 as a trojan capable of…

View Article
Cloud Computing and Security

Atlassian Releases Patches for Zero-Day Confluence RCE Flaw

Atlassian has released new security updates to fix a critical flaw affecting its Confluence Server and Data Center products. The vulnerability, tracked as CVE-2022-26134, allows for unauthenticated remote code execution on unpatched servers. The zero-day security flaw was disclosed by security company Volexity last week, and it impacts all supported versions (except those hosted on…

View Article
Security

Atlassian Warns of Active Exploitation of Unpatched Critical Confluence Flaw

Atlassian has published a security advisory about a new critical flaw impacting its Confluence Server and Data Center products. The company warned IT teams that the security vulnerability could lead to unauthenticated remote code execution (RCE). The security vulnerability, tracked as CVE-2022-26134, was discovered by the cybersecurity company Volexity. Atlassian released an advisory about the…

View Article
Windows 10

Security Researchers Discover New Windows Search Protocol Vulnerability

Security researchers have discovered a new zero-day vulnerability that allows hackers to launch a Windows search window via malicious Word documents. The security flaw exists in the Windows search protocol handler (search-ms) that allows applications and links to open searches for malicious attacks. According to Bleeping Computer, an attacker could abuse the protocol handler to…

View Article
Windows Server 3 Hero Approved

CISA Warns Windows Admins Against Applying May Patch Tuesday Updates on Domain Controllers

The US Cybersecurity and Infrastructure Security Agency (CISA) has temporarily removed the security flaw CVE-2022-26925 from its Known Exploited Vulnerability Catalog. It has warned that IT admins should not install the May 2021 Patch Tuesday updates on Windows Servers used as domain controllers due to the risk of authentication failures. The security advisory comes amid…

View Article
Security

F5 Confirms New Remote Code Execution Flaw in BIG-IP Systems

Last week, the application service provider F5 disclosed a new security vulnerability that allows threat actors with network access to execute commands on its BIG-IP networking devices. The critical security flaw, tracked as CVE-2022-1388, carries a CVSS score of 9.8 out of 10. According to the security advisory, the vulnerability exists in the representational state…

View Article
Security

TLStorm 2.0 Exploits Expose Millions of Aruba and Avaya Network Switches to RCE Attacks

Security researchers at Armis have discovered five critical vulnerabilities in multiple network devices sold by Aruba and Avaya. The security flaws, dubbed TLStorm 2.0, could allow malicious actors to gain complete control of network switches typically used in hospitals, hotels, airports, and other businesses. According to the security researchers, the TLStorm 2.0 vulnerabilities have CVSS…

View Article
Go to page