#vulnerabilities

[ follow ]
#openclaw
fromArs Technica
2 hours ago
Information security

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
fromTheregister
1 month ago
Information security

OpenClaw instances open to the internet present ripe targets

Over 135,000 internet-exposed OpenClaw AI agent instances, combined with known vulnerabilities and malicious skills, create a systemic security crisis.
Information security
fromArs Technica
2 hours ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
Information security
fromInfoWorld
5 hours ago

CERT-EU blames Trivy supply chain attack for Europa.eu data breach

TeamPCP exploited Trivy to access sensitive cloud credentials and data, creating significant vulnerabilities for organizations.
#cybersecurity
Information security
fromSecurityWeek
10 hours ago

In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware

New Android malware targets banking users, Italy fines Intesa Sanpaolo for data breach, Apple updates Mac security against ClickFix attacks.
fromThe Hacker News
1 day ago
Information security

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

Information security
fromThe Hacker News
4 days ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
Privacy professionals
fromTheregister
4 days ago

US router ban is 'industrial policy' not better infosec

The U.S. ban on foreign-made SOHO routers is ineffective for security and serves as industrial policy rather than genuine cybersecurity.
Information security
fromThe Hacker News
1 week ago

LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks

Three vulnerabilities in LangChain and LangGraph could expose sensitive enterprise data, including filesystem files, environment secrets, and conversation history.
Information security
fromSecurityWeek
10 hours ago

In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware

New Android malware targets banking users, Italy fines Intesa Sanpaolo for data breach, Apple updates Mac security against ClickFix attacks.
Information security
fromThe Hacker News
1 day ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromThe Hacker News
3 days ago

The AI Arms Race - Why Unified Exposure Management Is Becoming a Boardroom Priority

The cybersecurity landscape is rapidly evolving, with AI enabling faster and more sophisticated attacks, necessitating advanced defensive strategies.
Information security
fromThe Hacker News
4 days ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
Privacy professionals
fromTheregister
4 days ago

US router ban is 'industrial policy' not better infosec

The U.S. ban on foreign-made SOHO routers is ineffective for security and serves as industrial policy rather than genuine cybersecurity.
Information security
fromThe Hacker News
1 week ago

LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks

Three vulnerabilities in LangChain and LangGraph could expose sensitive enterprise data, including filesystem files, environment secrets, and conversation history.
#chrome
Information security
fromTechRepublic
1 day ago

Patch Now: Chrome Flaw Under Active Attack, Google Confirms

Google has released a security update for Chrome due to multiple high-severity vulnerabilities, including an actively exploited use-after-free flaw.
fromSecurityWeek
2 days ago
Information security

Exploited Zero-Day Among 21 Vulnerabilities Patched in Chrome

Google's Chrome 146 update addresses 21 vulnerabilities, including a zero-day exploit tracked as CVE-2026-5281.
Information security
fromTechRepublic
1 day ago

Patch Now: Chrome Flaw Under Active Attack, Google Confirms

Google has released a security update for Chrome due to multiple high-severity vulnerabilities, including an actively exploited use-after-free flaw.
#ai
Artificial intelligence
fromFortune
1 day ago

In the age of vibe coding, trust is the real bottleneck | Fortune

AI tools can generate code rapidly, but they also introduce vulnerabilities and require rigorous verification to ensure security and compliance.
fromDevOps.com
7 months ago
Artificial intelligence

Cycode Delivers AI Agent to Assess How Exploitable Vulnerabilities Are - DevOps.com

Cycode's AI Exploitability Agent prioritizes vulnerabilities in applications based on exploitability risk.
Artificial intelligence
fromFortune
1 day ago

In the age of vibe coding, trust is the real bottleneck | Fortune

AI tools can generate code rapidly, but they also introduce vulnerabilities and require rigorous verification to ensure security and compliance.
fromDevOps.com
7 months ago
Artificial intelligence

Cycode Delivers AI Agent to Assess How Exploitable Vulnerabilities Are - DevOps.com

#cisco
Information security
fromSecurityWeek
1 day ago

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
Information security
fromSecurityWeek
1 week ago

Cisco Patches Multiple Vulnerabilities in IOS Software

Cisco released patches for high- and medium-severity vulnerabilities in IOS and IOS XE, primarily to prevent denial-of-service conditions.
Python
fromThe Hacker News
1 day ago

The State of Trusted Open Source Report

AI is reshaping software development and security, influencing container image usage and vulnerability management.
#google-chrome
Information security
fromThe Hacker News
2 days ago

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation - Patch Released

Google released security updates for Chrome to address 21 vulnerabilities, including a zero-day flaw exploited in the wild.
Information security
fromTechRepublic
1 week ago

Google Issues High-Risk Security Patch for 3.5 Billion Chrome Users

Google has released a security update for Chrome addressing eight high-risk vulnerabilities affecting its 3.5 billion users.
#ai-security
Information security
fromSecurityWeek
2 days ago

Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents

Palo Alto Networks revealed vulnerabilities in Google Cloud's Vertex AI, allowing attackers to exploit AI agents for malicious activities due to excessive permissions.
fromComputerworld
3 days ago

Why the axios supply chain attack should have Apple worried

The attack illustrates the extent to which Big Tech relies on open-source software. Without the many contributions of open-source developers, Apple, Amazon, Google, Microsoft, and everyone else would need to invest vast sums in building more of the infrastructure of our digital world.
Information security
Information security
fromComputerWeekly.com
3 days ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Information security
fromAxios
5 days ago

Everyone's worried that AI's newest models are a hacker's dream weapon

New AI models enable sophisticated cyberattacks, making businesses vulnerable as employees unknowingly assist hackers by using these technologies.
Soccer (FIFA)
fromTheregister
1 week ago

AFC Ajax drops ball as hackers transfer tickets, lift bans

AFC Ajax experienced a data breach due to vulnerabilities, exposing personal data and allowing unauthorized access to user accounts.
#tp-link
Information security
fromTechRepublic
1 week ago

TP-Link Fixes Bug That Lets Hackers Take Over Routers Without a Password

TP-Link patched critical vulnerabilities in Archer NX routers that allowed unauthorized firmware installation and network manipulation.
Information security
fromTechRepublic
1 week ago

TP-Link Fixes Bug That Lets Hackers Take Over Routers Without a Password

TP-Link patched critical vulnerabilities in Archer NX routers that allowed unauthorized firmware installation and network manipulation.
Information security
fromSecurityWeek
1 week ago

BIND Updates Patch High-Severity Vulnerabilities

ISC released BIND 9 updates to fix four vulnerabilities, including two high-severity bugs that can lead to memory leaks and high CPU consumption.
Node JS
fromThe Cyber Express
1 week ago

Node.js Fixes CVE-2026-21637 And Critical Flaws Now

Node.js has released security updates addressing multiple vulnerabilities, including critical issues in TLS error handling and HTTP request processing.
fromSecurityWeek
1 week ago

iOS, macOS 26.4 Roll Out With Fresh Security Patches

Apple's iOS 26.4 and iPadOS 26.4 updates include patches for nearly 40 security defects, addressing critical vulnerabilities that could be exploited by malicious actors.
Apple
Information security
fromComputerWeekly.com
1 week ago

Cyber pros must grasp the vibe coding nettle, says NCSC chief | Computer Weekly

Cyber security professionals must develop safeguards for AI-enhanced software generation to prevent vulnerabilities and cyber attacks.
Information security
fromTechRepublic
1 week ago

New 'DarkSword' Leak Puts Millions of iPhones at Risk After Initial Attack

The leaked DarkSword exploit kit poses a significant threat to outdated iPhones, making attacks easier for less experienced hackers.
Information security
fromTheregister
1 week ago

Lightning-fast exploits mean patch fast, says Cisco Talos

Strengthening MFA policies and enhancing anti-phishing training are critical as attackers exploit vulnerabilities rapidly and effectively.
Information security
fromSecurityWeek
1 week ago

QNAP Patches Four Vulnerabilities Exploited at Pwn2Own

QNAP released patches for multiple vulnerabilities, including four critical issues demonstrated at Pwn2Own 2025 affecting SD-WAN routers.
Information security
fromTheregister
2 weeks ago

Cryptographer fights RustSec ban over bug reports

Nadim Kobeissi filed a complaint against Rust maintainers over critical bugs in cryptography libraries after facing dismissal and bans.
Information security
fromSecurityWeek
2 weeks ago

Thousands of Magento Sites Hit in Ongoing Defacement Campaign

Over 7,500 Magento sites were defaced in a campaign exploiting file upload vulnerabilities, affecting global brands and various organizations.
fromThe Hacker News
1 month ago

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

CVE-2025-65717 (CVSS score: 9.1) - A vulnerability in Live Server that allows attackers to exfiltrate local files, tricking a developer into visiting a malicious website when the extension is running, causing JavaScript embedded in the page to crawl and extract files from the local development HTTP server that runs at localhost:5500, and transmit them to a domain under their control. (Remains unpatched)
Information security
#ransomware
fromSecurityWeek
1 month ago

Chrome 145 Patches 11 Vulnerabilities

Google on Tuesday announced the release of Chrome 145 to the stable channel with fixes for 11 vulnerabilities, including three high-severity bugs. First in line is CVE-2026-2313, a high-severity use-after-free issue in CSS that earned the reporting researchers an $8,000 bug bounty reward. The two other high-severity defects, tracked as CVE-2026-2314 and CVE-2026-2315, were found and reported by Google and are described as a heap buffer overflow in Codecs and an inappropriate implementation in WebGPU, respectively.
Information security
Information security
fromComputerWeekly.com
1 month ago

CVE volumes may plausibly reach 100,000 this year | Computer Weekly

Disclosed CVEs may exceed 50,000 in 2026, with realistic scenarios reaching 70,000–100,000 and an urgent need to scale and prioritise vulnerability response.
Information security
fromSecurityWeek
1 month ago

Google-Intel Security Audit Reveals Severe TDX Vulnerability Allowing Full Compromise

Google and Intel's joint review of Intel TDX uncovered five vulnerabilities and 35 bugs, leading to patches for privilege escalation and information disclosure issues.
fromThe Cyber Express
2 months ago

The Cyber Express Weekly Roundup: Jan 2026 Threats & Trends

On January 26, 2026, Delta, a Russian alarm and vehicle security provider, suffered a major cyberattack, disrupting alarms, vehicle systems, and company communications for tens of thousands of customers. While no confirmed customer data breach occurred, an unverified leak circulated online.
Information security
Information security
fromTechzine Global
2 months ago

Rapid adoption of AI agents exposes structural weakness in MCP

Lack of authentication in the Model Context Protocol left many MCP servers exposed, enabling unauthorized full system access and data breaches.
fromSecurityWeek
2 months ago

Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms

Vulnerabilities discovered by researchers in Dormakaba physical access control systems could have allowed hackers to remotely open doors at major organizations. The security holes were discovered by experts at SEC Consult, a cybersecurity consulting firm under Atos-owned Eviden, in Dormakaba's Exos central management software, a hardware access manager, and registration units that enable entry via a keypad, fingerprint reader, or chip card.
Information security
fromTheregister
2 months ago

Meta admits to Instagram password reset mess, denies leaks

infosec in brief Meta has fixed a flaw in its Instagram service that allowed third parties to generate password reset emails, but denied the problem led to theft of users' personal information. Last Friday, security software vendor Malwarebytes claimed "Cybercriminals stole the sensitive information of 17.5 million Instagram accounts, including usernames, physical addresses, phone numbers, email addresses, and more." The vendor included a screenshot of a password reset email sent to Instagram users.
Information security
fromTechzine Global
2 months ago

Trend Micro closes critical vulnerabilities in Apex Central

The most serious, with a CVSS score of 9.8, allows attackers to execute code with SYSTEM privileges without authentication. Organizations should immediately patch to Build 7190. The most dangerous vulnerability, CVE-2025-69258, is a remote code execution vulnerability in LoadLibraryEX. An attacker can load a malicious DLL into a critical part of the system without login credentials. This gives them full control with the highest system privileges. The impact is significant: confidentiality, integrity, and availability are all at stake.
Information security
Information security
fromThe Hacker News
3 months ago

Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code

Picklescan contains critical vulnerabilities that allow attackers to bypass detection and execute arbitrary code via malicious PyTorch models, enabling supply-chain attacks.
#fluent-bit
fromFast Company
4 months ago

4 ways to outsmart cybercriminals

Cybercrime is a serious threat to the global economy, destroying livelihoods, sowing distrust, and undermining growth. One forecast has it costing more than $15 trillion annually by the end of the decade. If so, only the GDPs of the U.S. and China are bigger. There's cause for hope, though. As cyberthreats evolve, innovation is meeting the challenge. New solutions are leveraging AI, real-time threat intelligence, collaborative networks, and advanced authentication technologies.
Information security
Information security
fromIT Pro
5 months ago

Critical Dell Storage Manager flaws could let hackers access sensitive data - patch now

Critical authentication and XML entity vulnerabilities in Dell Storage Manager prior to 20.1.21 allow unauthenticated attackers to access APIs, disclose data, and access files.
Information security
fromInfoQ
5 months ago

Google Cloud Outlines Key Strategies for Securing Remote MCP Servers

A centralized MCP proxy provides a single enforcement point to secure, observe, and govern remote MCP server interactions, reducing vulnerabilities and scaling protections.
fromIT Pro
5 months ago

Threat actors are exploiting flaws more quickly - here's what business leaders should do

In July, Microsoft fixed a flaw in its file sharing service SharePoint that was already being exploited by attackers. Later that month, Microsoft warned that hackers were making use of the zero-day to distribute ransomware, adding even more risk to the serious vulnerability. The SharePoint flaw is just one example of attackers becoming faster at exploiting vulnerabilities before they can be properly addressed by vendors and patched by organizations.
Information security
Information security
fromThe Hacker News
5 months ago

Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors

RondoDox botnet campaigns exploit over 50 vulnerabilities across 30+ vendors and use loader-as-a-service with Mirai/Morte to expand automated network exploitation.
Information security
fromSecurityWeek
5 months ago

Juniper Networks Patches Critical Junos Space Vulnerabilities

Juniper released patches addressing nearly 220 vulnerabilities across Junos OS, Junos Space, and Security Director, including nine critical-severity flaws.
Information security
fromIT Pro
5 months ago

Critical networks face unprecedented threat as DDoS attacks are getting shorter and more intense

DDoS attacks on critical networks have surged to terabit-scale, exploiting compromised home connections and causing rapid, intense outages and data breaches.
fromZDNET
5 months ago

Google will pay you up to $30,000 in rewards to find bugs in its AI products

On Monday, Google security engineering managers Jason Parsons and Zak Bennett said in a blog post that the new program, an extension of the tech giant's existing Abuse Vulnerability Reward Program (VRP), will incentivize researchers and bug bounty hunters to focus on "high-impact abuse issues and security vulnerabilities" in Google products and services.
Artificial intelligence
Information security
fromZDNET
5 months ago

Hundreds of free VPNs offer 'no real privacy at all,' researchers warn - does yours?

Most free VPN apps contain serious security flaws that can expose data, enable privilege escalation, and negate user privacy protections.
Information security
fromSecurityWeek
6 months ago

Chrome 141 and Firefox 143 Patches Fix High-Severity Vulnerabilities

Chrome 141 and Firefox 143.0.3 patch multiple high-severity vulnerabilities across WebGPU, Video, Graphics, and JavaScript engine components; users should update promptly.
Information security
fromSecurityWeek
6 months ago

High-Severity Vulnerabilities Patched in VMware Aria Operations, NSX, vCenter

Broadcom released patches fixing six VMware vulnerabilities—including four high-severity flaws—that affect Aria Operations, NSX, vCenter, VMware Tools, and related platforms.
fromDefector
6 months ago

Donald Trump Posts Fake Video Of Himself Promoting Fake Medical Technology In Fake News Segment | Defector

Visualize any system's defenses against failure-a biological immune system, or a healthcare delivery system, or an aircraft control system-as a series of slices of delicious, creamy Emmentaler cheese. Each layer has a couple of holes (vulnerabilities) in it, of varying size, here and there, but as long as the holes are not aligned with each other, no threat to the system can pass all the way through all the layers,
Information security
Information security
fromSecurityWeek
6 months ago

No Patches for Vulnerabilities Allowing Cognex Industrial Camera Hacking

Multiple Cognex In-Sight industrial camera models contain high-severity vulnerabilities and will not receive patches, exposing network-accessible systems to compromise.
Information security
fromTheregister
6 months ago

Claude Code runs code to test if is safe, which has risks

Automated security reviews can find simple vulnerabilities but may miss complex exploits, be deceived by crafted code, and introduce risk by executing tests.
fromDevOps.com
6 months ago

Report: ChatGPT-5 Coding Gains Come at a Higher Cost - DevOps.com

Based on over 4,400 Java tasks, the report finds that depending on which of the four levels of reasoning capabilities that OpenAI now makes available, the overall quality of the code, especially in terms of the vulnerabilities generated, significantly improves. However, the overall volume of code being generated per task also substantially increases, which creates additional maintenance challenges for application developers that are not going to be familiar with how code might have been constructed in the first place.
Artificial intelligence
Information security
fromSecurityWeek
7 months ago

Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution

Xerox patched two serious vulnerabilities in FreeFlow Core that allow remote attackers to execute arbitrary code.
Software development
fromDevOps.com
7 months ago

Sonar Surfaces Multiple Caveats When Relying on LLMs to Write Code - DevOps.com

Large language models generate syntactically correct code but introduce significant security vulnerabilities.
Java
fromInfoQ
7 months ago

Java News Roundup: Spring Framework, Spring Data, Open Liberty, Hibernate Reactive, Quarkus, Gradle

Java development continues to evolve with major releases and updates in frameworks and libraries.
fromArs Technica
7 months ago

Encryption made for police and military radios may be easily cracked

At least one implementation of the end-to-end encryption solution endorsed by ETSI has a similar issue that makes it equally vulnerable to eavesdropping.
Privacy technologies
Artificial intelligence
fromNextgov.com
7 months ago

DARPA unveils winners of AI challenge to boost critical infrastructure cybersecurity

AI Cyber Challenge announced winners focusing on AI models for identifying and patching vulnerabilities in critical infrastructure code.
Apple
fromstupidDOPE | Est. 2008
7 months ago

Update Your iPhone Now: iOS 18.6 Patches 29 Serious Security Flaws | stupidDOPE | Est. 2008

iOS 18.6 is crucial for iPhone security, fixing 29 vulnerabilities, particularly in Safari and WebKit.
fromTheregister
7 months ago

CISA releases malware analysis for Sharepoint Server attack

CISA analysed six files including two Dynamic Link-Library (.DLL), one cryptographic key stealer, and three web shells. Cyber threat actors could leverage this malware to steal cryptographic keys and execute a Base64-encoded PowerShell command to fingerprint host system and exfiltrate data.
Privacy professionals
fromTheregister
7 months ago

Nvidia patches bug chain leading to total Triton takeover

The first vulnerability (CVE-2025-23320 - 7.5) relates to a bug in the Python backend, triggered by exceeding the shared memory limit, using a very large request.
Information security
fromTheregister
8 months ago

Blame a leak for Microsoft SharePoint attacks: researcher

A leak happened here somewhere,” Dustin Childs, head of threat awareness at Trend Micro's Zero Day Initiative (ZDI), told The Register. “And now you’ve got a zero-day exploit in the wild, and worse than that, you’ve got a zero-day exploit in the wild that bypasses the patch, which came out the next day.
Privacy professionals
[ Load more ]