Tag cybersecurity

Fortinet Issues Warning About New Zero-Day Exploit Targeting Firewalls with Exposed Interfaces

Recent reports have highlighted a concerning campaign targeting Fortinet FortiGate firewalls with exposed management interfaces on the public internet. Released by cybersecurity firm Arctic Wolf, this analysis reveals significant unauthorized access to these critical devices. The attackers were able to log in as administrators, create new accounts, authenticate through SSL…

Read MoreFortinet Issues Warning About New Zero-Day Exploit Targeting Firewalls with Exposed Interfaces

Critical Vulnerabilities in SimpleHelp Enable File Theft, Privilege Escalation, and Remote Code Execution Attacks

Critical Flaws Discovered in SimpleHelp Remote Access Software: Urgent Action Required Recent cybersecurity research has unveiled several significant vulnerabilities in the SimpleHelp remote access software, raising concerns for businesses relying on this platform. These flaws, identified by Horizon3.ai researcher Naveen Sunkavally, posed risks including potential information disclosure, privilege escalation, and…

Read MoreCritical Vulnerabilities in SimpleHelp Enable File Theft, Privilege Escalation, and Remote Code Execution Attacks

As Digital Payments Surge, Here’s How Small Retailers Can Tackle Cybersecurity Threats

Cybersecurity Vulnerabilities: SMEs as Prime Targets Many small and medium-sized enterprises (SMEs) operate under the erroneous belief that their size shields them from the attentions of cybercriminals. This misconception could not be further from the truth. In fact, SMEs are increasingly becoming prime targets for a range of cyber threats,…

Read MoreAs Digital Payments Surge, Here’s How Small Retailers Can Tackle Cybersecurity Threats

Researchers Discover Exploit Bypassing Active Directory Restrictions on NTLMv1

Recent findings by cybersecurity experts have unveiled a considerable vulnerability in the Microsoft Active Directory Group Policy designed to disable the authentication method NT LAN Manager (NTLM) version 1. Researchers indicate that a misconfiguration within on-premises applications is capable of easily bypassing this Group Policy measure. According to Dor Segal,…

Read MoreResearchers Discover Exploit Bypassing Active Directory Restrictions on NTLMv1

Serious Vulnerabilities in WGS-804HPT Switches Allow for Remote Code Execution and Network Exploitation

Planet Technology’s WGS-804HPT Switches Vulnerable to Remote Code Execution Cybersecurity experts have unveiled three critical vulnerabilities in Planet Technology’s WGS-804HPT industrial switches, which could be exploited to facilitate pre-authentication remote code execution. These switches are integral to numerous building and home automation systems, serving a variety of networking functions. Tomer…

Read MoreSerious Vulnerabilities in WGS-804HPT Switches Allow for Remote Code Execution and Network Exploitation

Automotive Titan Stellantis Faces Significant Third-Party Data Breach

NEW You can now listen to Fox News articles! Stellantis, a prominent automotive manufacturer, has confirmed a significant data breach that compromised customer contact information. The intrusion occurred through a third-party platform utilized for customer services in North America. This incident aligns with a series of large-scale cyberattacks targeting cloud-based…

Read MoreAutomotive Titan Stellantis Faces Significant Third-Party Data Breach

Renault Alerts UK Customers About Data Breach Involving Third-Party Supplier

Stolen Data May Fuel Targeted Phishing Campaigns, Experts Caution Renault has informed a number of UK customers that their personal information may have been compromised as a result of a cyberattack on one of its third-party suppliers. The car manufacturer’s notification follows an incident that has raised concerns about the…

Read MoreRenault Alerts UK Customers About Data Breach Involving Third-Party Supplier

Mirai Variant Murdoc Botnet Targets AVTECH IP Cameras and Huawei Routers

Cybersecurity experts have recently identified an extensive campaign designed to exploit vulnerabilities in AVTECH IP cameras and Huawei HG532 routers. This initiative has been largely successful in integrating these devices into a variant of the Mirai botnet known as the Murdoc Botnet. The ongoing operations reflect a significant escalation in…

Read MoreMirai Variant Murdoc Botnet Targets AVTECH IP Cameras and Huawei Routers