#log4shell

[ follow ]
Information security
fromInfoQ
1 day ago

Open Source Security Tool Trivy Hit by Supply Chain Attack, Prompting Urgent Industry Response

A malicious release of the Trivy vulnerability scanner exposed critical weaknesses in software supply chain security, allowing for potential credential theft.
#openclaw
DevOps
fromInfoWorld
1 day ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
18 hours ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
DevOps
fromInfoWorld
1 day ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
Information security
fromArs Technica
18 hours ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
Python
fromThe Hacker News
2 days ago

The State of Trusted Open Source Report

AI is reshaping software development and security, influencing container image usage and vulnerability management.
#npm
Node JS
fromInfoQ
2 days ago

Axios npm Package Compromised in Supply Chain Attack

A significant supply chain attack on Axios introduced a Remote Access Trojan via hijacked maintainer accounts, affecting numerous developer environments.
Node JS
fromTheregister
4 days ago

Top npm package backdoored to drop dirty RAT on dev machines

A widely used npm library, axios, was compromised to deliver malware through a maintainer's hijacked account.
Node JS
fromBleepingComputer
4 days ago

Hackers compromise Axios npm package to drop cross-platform malware

Hackers compromised the Axios npm account to distribute remote access trojans across multiple operating systems.
Node JS
fromInfoQ
2 days ago

Axios npm Package Compromised in Supply Chain Attack

A significant supply chain attack on Axios introduced a Remote Access Trojan via hijacked maintainer accounts, affecting numerous developer environments.
Node JS
fromTheregister
4 days ago

Top npm package backdoored to drop dirty RAT on dev machines

A widely used npm library, axios, was compromised to deliver malware through a maintainer's hijacked account.
Node JS
fromBleepingComputer
4 days ago

Hackers compromise Axios npm package to drop cross-platform malware

Hackers compromised the Axios npm account to distribute remote access trojans across multiple operating systems.
Java
fromInfoQ
2 days ago

Helidon 4.4.0 Introduces Alignment with OpenJDK Cadence and Support via Java Verified Portfolio

Helidon 4.4.0 introduces alignment with OpenJDK, new features, and support for LangChain4j, changing its versioning to match OpenJDK's release cadence.
Software development
fromDevOps.com
2 days ago

Why Code Validation is the Next Frontier - DevOps.com

Shared staging environments are inadequate for modern development; isolated, on-demand setups are needed for effective validation.
#microsoft
fromTheregister
4 days ago
Tech industry

Microsoft plans another out-of-band Windows fix

Microsoft is releasing an out-of-band update to fix installation errors from a problematic preview update.
Tech industry
fromTheregister
4 days ago

Microsoft plans another out-of-band Windows fix

Microsoft is releasing an out-of-band update to fix installation errors from a problematic preview update.
Information security
fromTechzine Global
1 day ago

JFrog Artifactory: how to secure binaries in the AI era

AI-generated code is creating a security crisis that traditional methods cannot manage, necessitating a new approach to binary management.
#cybersecurity
Information security
fromSecurityWeek
1 day ago

In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware

New Android malware targets banking users, Italy fines Intesa Sanpaolo for data breach, Apple updates Mac security against ClickFix attacks.
Information security
fromTechCrunch
3 days ago

Hacker hijacks Axios open-source project, used by millions, to push malware | TechCrunch

A hacker compromised the Axios library to deliver malware, risking millions of developers' systems.
Node JS
fromInfoQ
5 days ago

Are We Ready for the Next Cyber Security Crisis Like Log4shell?

Organizations are not prepared for the next cybersecurity crisis, similar to Log4Shell.
Information security
fromThe Hacker News
1 day ago

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

A targeted social engineering campaign by North Korean actors led to a supply chain compromise of the Axios npm package.
Information security
fromThe Hacker News
2 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromSecurityWeek
1 day ago

In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware

New Android malware targets banking users, Italy fines Intesa Sanpaolo for data breach, Apple updates Mac security against ClickFix attacks.
Information security
fromTechCrunch
3 days ago

Hacker hijacks Axios open-source project, used by millions, to push malware | TechCrunch

A hacker compromised the Axios library to deliver malware, risking millions of developers' systems.
#claude-code
Software development
fromArs Technica
3 days ago

Entire Claude Code CLI source code leaks thanks to exposed map file

Claude Code's complexity and architecture provide valuable insights for competitors and pose security risks for Anthropic.
Information security
fromSecurityWeek
1 day ago

Critical Vulnerability in Claude Code Emerges Days After Source Leak

Anthropic's Claude Code source code was leaked, revealing operational details but not compromising sensitive data like model weights or customer information.
Software development
fromArs Technica
3 days ago

Entire Claude Code CLI source code leaks thanks to exposed map file

Claude Code's complexity and architecture provide valuable insights for competitors and pose security risks for Anthropic.
Information security
fromSecurityWeek
1 day ago

Critical Vulnerability in Claude Code Emerges Days After Source Leak

Anthropic's Claude Code source code was leaked, revealing operational details but not compromising sensitive data like model weights or customer information.
DevOps
fromInfoQ
4 days ago

Failure As a Means to Build Resilient Software Systems: A Conversation with Lorin Hochstein

Using software failures can enhance software architecture and reliability engineering practices.
Information security
fromThe Hacker News
21 hours ago

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Threat actors exploit HTTP cookies for PHP web shells on Linux servers, enabling remote code execution with stealthy control mechanisms.
DevOps
fromInfoQ
6 days ago

Kubescape 4.0 Brings Runtime Security and AI Agent Scanning to Kubernetes

Kubescape 4.0 introduces runtime threat detection and AI security features, enhancing Kubernetes security for AI agents and improving scanning capabilities.
#axios
Node JS
fromSecurityWeek
3 days ago

Axios NPM Package Breached in North Korean Supply Chain Attack

Malicious Axios NPM library versions were distributed in a supply chain attack by North Korean hackers, affecting millions of users.
Node JS
fromThe Hacker News
4 days ago

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

Axios experienced a supply chain attack due to malicious dependencies in two npm package versions.
Information security
fromSiliconANGLE
3 days ago

Hackers compromise popular Axios Javascript library with hidden malware - SiliconANGLE

Axios HTTP client library was hacked to distribute malware via a compromised npm account, affecting multiple operating systems.
Node JS
fromSecurityWeek
3 days ago

Axios NPM Package Breached in North Korean Supply Chain Attack

Malicious Axios NPM library versions were distributed in a supply chain attack by North Korean hackers, affecting millions of users.
Node JS
fromThe Hacker News
4 days ago

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

Axios experienced a supply chain attack due to malicious dependencies in two npm package versions.
Information security
fromSiliconANGLE
3 days ago

Hackers compromise popular Axios Javascript library with hidden malware - SiliconANGLE

Axios HTTP client library was hacked to distribute malware via a compromised npm account, affecting multiple operating systems.
Information security
fromSecurityWeek
1 day ago

Critical ShareFile Flaws Lead to Unauthenticated RCE

Two critical vulnerabilities in ShareFile could allow unauthenticated remote code execution through improper access to configuration pages.
Java
fromTechzine Global
2 weeks ago

Oracle Releases Java 26: AI, Security, and the Java Verified Portfolio

Oracle releases Java 26 with ten JEPs focused on AI integration, cryptography, and developer productivity, including HTTP/3 support and post-quantum security enhancements.
fromComputerworld
19 hours ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Software development
fromInfoWorld
2 weeks ago

Open VSX extensions hijacked: GlassWorm malware spreads via dependency abuse

Malicious VS Code extensions impersonate legitimate developer tools like ESLint, Prettier, and AI coding assistants to infiltrate systems through the Open VSX marketplace.
#cisco
Information security
fromThe Hacker News
1 day ago

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

Cisco has released critical updates to address vulnerabilities in its Integrated Management Controller and Smart Software Manager On-Prem.
Information security
fromSecurityWeek
2 days ago

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
Information security
fromThe Hacker News
1 day ago

Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise

Cisco has released critical updates to address vulnerabilities in its Integrated Management Controller and Smart Software Manager On-Prem.
Information security
fromSecurityWeek
2 days ago

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
Information security
fromThe Hacker News
1 day ago

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

A large-scale credential harvesting operation exploits the React2Shell vulnerability to steal sensitive data from compromised hosts across multiple regions.
Information security
fromSecurityWeek
1 day ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
Software development
fromDevOps.com
1 month ago

When AI Gets It Wrong: The Insecure Defaults Lurking in Your Code - DevOps.com

Generative AI accelerates code development but introduces security vulnerabilities because AI models learn insecure patterns from training data rather than understanding security principles.
#ai-security
Information security
fromInfoWorld
1 day ago

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Leaks threaten Anthropic's market position and raise security concerns about its AI coding tools.
Information security
fromDevOps.com
2 weeks ago

Arcjet Extends Runtime Policy Engine to Block Malicious Prompts - DevOps.com

Arcjet introduces a prompt injection protection capability to block risky prompts before they reach AI models in applications.
Information security
fromInfoWorld
1 day ago

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Leaks threaten Anthropic's market position and raise security concerns about its AI coding tools.
Information security
fromDevOps.com
2 weeks ago

Arcjet Extends Runtime Policy Engine to Block Malicious Prompts - DevOps.com

Arcjet introduces a prompt injection protection capability to block risky prompts before they reach AI models in applications.
Information security
fromTechzine Global
1 day ago

Axios supply chain attack victim posts postmortem to prevent a repeat

Axios was compromised for three hours, distributing Remote Access Trojans due to a sophisticated social engineering attack by North Korean group UNC1069.
#supply-chain-attack
Information security
fromInfoQ
4 days ago

PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information

A supply chain attack on LiteLLM led to over 40,000 downloads of a compromised package that harvested sensitive information.
Information security
fromTechzine Global
2 weeks ago

GlassWorm malware surfaces in development environments

GlassWorm operation compromised over 400 software components across GitHub, npm, and development marketplaces using supply-chain attacks and blockchain-based command-and-control infrastructure.
Information security
fromInfoQ
4 days ago

PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information

A supply chain attack on LiteLLM led to over 40,000 downloads of a compromised package that harvested sensitive information.
Information security
fromTechzine Global
2 weeks ago

GlassWorm malware surfaces in development environments

GlassWorm operation compromised over 400 software components across GitHub, npm, and development marketplaces using supply-chain attacks and blockchain-based command-and-control infrastructure.
#chrome
Information security
fromTechRepublic
1 day ago

Patch Now: Chrome Flaw Under Active Attack, Google Confirms

Google has released a security update for Chrome due to multiple high-severity vulnerabilities, including an actively exploited use-after-free flaw.
Information security
fromTechRepublic
1 day ago

Patch Now: Chrome Flaw Under Active Attack, Google Confirms

Google has released a security update for Chrome due to multiple high-severity vulnerabilities, including an actively exploited use-after-free flaw.
fromThe Hacker News
3 days ago

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation - Patch Released

"Use-after-free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page."
Information security
Information security
fromSecurityWeek
4 days ago

Exploitation of Critical Fortinet FortiClient EMS Flaw Begins

Threat actors exploit a critical SQL injection vulnerability in Fortinet FortiClient EMS, allowing remote code execution without authentication.
fromComputerworld
3 days ago

Why the axios supply chain attack should have Apple worried

The attack illustrates the extent to which Big Tech relies on open-source software. Without the many contributions of open-source developers, Apple, Amazon, Google, Microsoft, and everyone else would need to invest vast sums in building more of the infrastructure of our digital world.
Information security
Java
fromTheregister
2 months ago

Java devs want container security - not the hassle

Many Java developers prefer pre-hardened container providers because securing containers and related tooling is time-consuming, error-prone, and constrained by organizational resources.
Information security
fromInfoQ
4 days ago

Cloudflare Adds Active API Vulnerability Scanning to Its Edge

Cloudflare's Web and API Vulnerability Scanner focuses on detecting Broken Object Level Authorization vulnerabilities in APIs.
Information security
fromSecurityWeek
4 days ago

Critical Vulnerability in OpenAI Codex Allowed GitHub Token Compromise

OAuth tokens pose significant security risks, especially when long-lived, as they can lead to widespread breaches across multiple organizations.
fromBleepingComputer
4 days ago

New RoadK1ll WebSocket implant used to pivot on breached networks

"Its sole function is to convert a single compromised machine into a controllable relay point, an access amplifier, through which an operator can pivot to internal systems, services, and network segments that would otherwise be unreachable from outside the perimeter."
Information security
#citrix
Information security
fromTheregister
5 days ago

Citrix NetScaler bug may be multiple flaws in one

In-the-wild exploitation of a critical Citrix NetScaler bug has begun, with attackers actively targeting vulnerable systems within days of its disclosure.
Information security
fromSecurityWeek
5 days ago

Exploitation of Fresh Citrix NetScaler Vulnerability Begins

Exploitation of a critical Citrix NetScaler vulnerability began shortly after its public disclosure, with active attempts detected within days.
Information security
fromTheregister
5 days ago

Citrix NetScaler bug may be multiple flaws in one

In-the-wild exploitation of a critical Citrix NetScaler bug has begun, with attackers actively targeting vulnerable systems within days of its disclosure.
Information security
fromSecurityWeek
5 days ago

Exploitation of Fresh Citrix NetScaler Vulnerability Begins

Exploitation of a critical Citrix NetScaler vulnerability began shortly after its public disclosure, with active attempts detected within days.
Java
fromInfoQ
2 months ago

Java News Roundup: WildFly 39, Open Liberty, Spring Framework, JobRunr, Gradle, Micrometer

Java ecosystem updates include WildFly 39 GA, multiple framework and tool point/maintenance releases, JDK 26 rampdown, JDK 27 JEP progress, and OpenJDK post-quantum TLS work.
Information security
fromTechzine Global
5 days ago

Major phishing campaign on GitHub using fake security alerts

A large-scale phishing campaign targets developers on GitHub, exploiting Discussions to spread fake security alerts about Visual Studio Code and distribute malware.
Information security
fromThe Hacker News
1 week ago

We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them

AWS Bedrock's connectivity makes it powerful but also exposes it to multiple attack vectors that can compromise enterprise data.
#oracle
Information security
fromTechzine Global
1 week ago

Oracle releases emergency patch for serious vulnerability

A critical vulnerability in Oracle Identity Manager and Oracle Web Services Manager allows remote code execution without authentication, posing severe risks.
Information security
fromSecurityWeek
1 week ago

Oracle Releases Emergency Patch for Critical Identity Manager Vulnerability

Oracle issued critical patches for vulnerabilities in Identity Manager and Web Services Manager, allowing remote code execution by unauthenticated attackers.
Information security
fromTechzine Global
1 week ago

Oracle releases emergency patch for serious vulnerability

A critical vulnerability in Oracle Identity Manager and Oracle Web Services Manager allows remote code execution without authentication, posing severe risks.
Information security
fromSecurityWeek
1 week ago

Oracle Releases Emergency Patch for Critical Identity Manager Vulnerability

Oracle issued critical patches for vulnerabilities in Identity Manager and Web Services Manager, allowing remote code execution by unauthenticated attackers.
#langflow
Information security
fromThe Hacker News
2 weeks ago

Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure

A critical security flaw in Langflow allows unauthenticated remote code execution, exploited within 20 hours of disclosure.
Information security
fromSecurityWeek
2 weeks ago

Critical Langflow Vulnerability Exploited Hours After Public Disclosure

Threat actors exploited a critical Langflow vulnerability for remote code execution within 20 hours of its public disclosure.
Information security
fromThe Hacker News
2 weeks ago

Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure

A critical security flaw in Langflow allows unauthenticated remote code execution, exploited within 20 hours of disclosure.
Information security
fromSecurityWeek
2 weeks ago

Critical Langflow Vulnerability Exploited Hours After Public Disclosure

Threat actors exploited a critical Langflow vulnerability for remote code execution within 20 hours of its public disclosure.
Information security
fromThe Hacker News
2 weeks ago

AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

Amazon Bedrock AgentCore Code Interpreter's sandbox allows outbound DNS queries, enabling attackers to exfiltrate data and establish command-and-control channels despite network isolation configuration.
Information security
fromThe Hacker News
2 weeks ago

CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths

CISA added CVE-2025-47813, a medium-severity information disclosure vulnerability in Wing FTP Server, to its Known Exploited Vulnerabilities catalog due to active exploitation evidence.
Information security
fromArs Technica
3 weeks ago

Supply-chain attack using invisible code hits GitHub and other repositories

Hackers use invisible Unicode characters to hide malicious code that appears as whitespace to humans but executes normally in JavaScript and AI systems.
Information security
fromTheregister
3 weeks ago

CISA says n8n critical bug exploited in real-world attacks

CISA mandates immediate patching of CVE-2025-68613, a critical 9.9-severity remote code execution vulnerability in n8n workflow automation platform affecting over 103,000 users.
Information security
fromThe Hacker News
3 weeks ago

The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

Teams must reduce unnecessary internet-facing exposure to minimize vulnerability exploitation risk, as time-to-exploit windows are shrinking to hours or minutes.
Information security
fromThe Hacker News
3 weeks ago

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

CISA added three actively exploited vulnerabilities to its KEV catalog, including critical flaws in SolarWinds Web Help Desk, Omnissa Workspace One UEM, and Ivanti Endpoint Manager, with federal agencies required to patch by mid-to-late March 2026.
Information security
fromTechCrunch
4 weeks ago

Google says half of all zero-days it tracked in 2025 targeted buggy enterprise tech | TechCrunch

Nearly half of tracked zero-day vulnerabilities in 2024 targeted enterprise devices, with security infrastructure like firewalls and VPNs being primary targets for hackers seeking corporate data access.
Information security
fromComputerWeekly.com
1 month ago

Application exploitation back in vogue, says IBM cyber unit | Computer Weekly

Cyber attacks exploiting vulnerable public-facing applications increased 44%, surpassing credential abuse attacks, with AI tools accelerating vulnerability discovery and exploitation.
Information security
fromSecurityWeek
2 months ago

2024 VMware Flaw Now in Attackers' Crosshairs

CVE-2024-37079, a critical DCERPC out-of-bounds write in VMware vCenter (CVSS 9.8), is being exploited in the wild; apply June 2024 patches immediately.
#cve-2026-20045
Information security
fromInfoWorld
2 months ago

Open WebUI bug turns the 'free model' into an enterprise backdoor

Open WebUI's storage of long-lived JWTs in localStorage plus Direct Connections execute events enables account takeover and can escalate to remote code execution.
fromThe Hacker News
2 months ago

Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways

The vulnerability, tracked as CVE-2025-20393 (CVSS score: 10.0), is a remote command execution flaw arising as a result of insufficient validation of HTTP requests by the Spam Quarantine feature. Successful exploitation of the defect could permit an attacker to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance. However, for the attack to work, three conditions must be met - The appliance is running a vulnerable release of Cisco AsyncOS Software The appliance is configured with the Spam Quarantine feature The Spam Quarantine feature is exposed to and reachable from the internet
Information security
Information security
fromThe Hacker News
2 months ago

Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution

Three mcp-server-git vulnerabilities enable prompt-injection attackers to read or delete arbitrary files, execute code, and manipulate repositories unless updated to fixed versions.
#solarwinds-whd
Information security
fromSecurityWeek
1 month ago

Fresh SolarWinds Vulnerability Exploited in Attacks

Threat actors are actively exploiting an unauthenticated deserialization RCE in SolarWinds Web Help Desk (CVE-2025-40551); immediate patching is required.
Information security
fromSecurityWeek
1 month ago

Recent SolarWinds Flaws Potentially Exploited as Zero-Days

Attackers exploited vulnerabilities in internet-exposed SolarWinds Web Help Desk to gain access, deploy RMM tools, and maintain persistence using virtual machines and DLL sideloading.
Information security
fromSecurityWeek
1 month ago

Fresh SolarWinds Vulnerability Exploited in Attacks

Threat actors are actively exploiting an unauthenticated deserialization RCE in SolarWinds Web Help Desk (CVE-2025-40551); immediate patching is required.
Information security
fromSecurityWeek
1 month ago

Recent SolarWinds Flaws Potentially Exploited as Zero-Days

Attackers exploited vulnerabilities in internet-exposed SolarWinds Web Help Desk to gain access, deploy RMM tools, and maintain persistence using virtual machines and DLL sideloading.
fromTheregister
2 months ago

Critical n8n bug allows unauthenticated server takeover

The vulnerability, uncovered by researchers at security outfit Cyera, carries a CVSS score of 10.0 and has been dubbed "ni8mare" for good reason. Tracked as CVE-2026-21858, the flaw allows an unauthenticated attacker to execute arbitrary code on vulnerable systems, effectively handing over complete control of the affected environment. There is no workaround other than patching, and users are urged to upgrade to n8n version 1.121.0 or later.
Information security
Information security
fromSecurityWeek
2 months ago

Organizations Warned of Exploited Linux Vulnerabilities

Critical GNU Inetutils telnetd authentication bypass (CVE-2026-24061) enables remote root via crafted Telnet USER variable, and kernel integer overflow (CVE-2018-14634) permits privilege escalation.
Information security
fromTheregister
1 month ago

Critical Microsoft bug from 2024 under exploitation

A 9.8-rated SQL injection in Microsoft Configuration Manager, patched Oct 2024, is actively exploited and requires immediate patching.
Information security
fromSecurityWeek
2 months ago

High-Severity Remote Code Execution Vulnerability Patched in OpenSSL

OpenSSL patched twelve vulnerabilities including a high-severity stack buffer overflow (CVE-2025-15467) that can cause DoS or remote code execution.
Information security
fromTechzine Global
2 months ago

Multiple vulnerabilities found in Anthropic's Git MCP server

Anthropic's reference Git MCP server contained multiple vulnerabilities that allowed arbitrary file access and command execution, exposing the MCP ecosystem to significant security risk.
[ Load more ]