Category vulnerabilities

Do You Fully Trust Your Web Application Supply Chain?

You should reconsider your trust. Vulnerabilities could be lurking beneath the surface. The modular design of contemporary web applications contributes significantly to their efficiency. These applications can utilize a plethora of third-party components, JavaScript frameworks, and open-source tools to deliver diverse functionalities that enhance customer experience. However, this complex web…

Read MoreDo You Fully Trust Your Web Application Supply Chain?

Caution: Malicious WinRAR Exploit on GitHub Spreads Venom RAT to Users

A recent incident highlights a significant cybersecurity threat involving a counterfeit proof-of-concept (PoC) exploit for a newly identified vulnerability in WinRAR. This exploit was shared on GitHub with the malicious intent of infecting users who downloaded the code with Venom RAT malware. Researchers from Palo Alto Networks’ Unit 42, including…

Read MoreCaution: Malicious WinRAR Exploit on GitHub Spreads Venom RAT to Users

Apple Moves Quickly to Address 3 New Zero-Day Vulnerabilities in iOS, macOS, Safari, and More

Apple Addresses Three Critical Zero-Day Vulnerabilities in Latest Security Update Apple has recently issued a series of security patches aimed at addressing three zero-day vulnerabilities that have been actively exploited across its platforms, including iOS, iPadOS, macOS, watchOS, and Safari. This latest update brings the total number of discovered zero-day…

Read MoreApple Moves Quickly to Address 3 New Zero-Day Vulnerabilities in iOS, macOS, Safari, and More

Critical Vulnerabilities Discovered in Atlassian Products and ISC BIND Server

Recently, Atlassian and the Internet Systems Consortium (ISC) announced the discovery of critical security vulnerabilities impacting their respective products, which could potentially lead to denial-of-service (DoS) conditions and remote code execution (RCE). These flaws primarily affect organizations using Atlassian’s software suite and ISC’s BIND DNS software. Atlassian, an Australian-based software…

Read MoreCritical Vulnerabilities Discovered in Atlassian Products and ISC BIND Server

New Apple Zero-Day Vulnerabilities Exploited to Target Egyptian Former MP Using Predator Spyware

Apple has recently addressed three significant zero-day vulnerabilities, reported on September 21, 2023. These flaws were exploited to form part of an attack chain targeting former Egyptian parliament member Ahmed Eltantawy. Between May and September 2023, this attack aimed to deliver a spyware variant known as Predator, raising serious concerns…

Read MoreNew Apple Zero-Day Vulnerabilities Exploited to Target Egyptian Former MP Using Predator Spyware

Serious JetBrains TeamCity Vulnerability May Expose Source Code and Build Pipelines to Attackers

A serious security vulnerability has been identified in JetBrains’ TeamCity continuous integration and deployment software, allowing unauthenticated attackers to potentially execute remote code on targeted systems. This flaw, categorized as CVE-2023-42793, is assigned a critical CVSS score of 9.8 and was rectified in the TeamCity version 2023.05.4, released following responsible…

Read MoreSerious JetBrains TeamCity Vulnerability May Expose Source Code and Build Pipelines to Attackers

Update Chrome Immediately: Google Issues Fix for Actively Exploited Zero-Day Vulnerability

Google Addresses Critical Chrome Zero-Day Vulnerability On Wednesday, Google announced the release of updates to fix a newly identified zero-day vulnerability in its Chrome browser. This flaw, tracked as CVE-2023-5217, is categorized as a high-severity heap-based buffer overflow affecting the VP8 compression format linked to libvpx, an open-source video codec…

Read MoreUpdate Chrome Immediately: Google Issues Fix for Actively Exploited Zero-Day Vulnerability

Cisco Alerts Users to Vulnerability in IOS and IOS XE Software Following Exploitation Attempts

Cisco Warns of Remote Code Execution Vulnerability in IOS and IOS XE Software Cisco has issued a warning regarding a significant vulnerability affecting its IOS Software and IOS XE Software, which could allow an authenticated remote attacker to execute arbitrary code on compromised systems. This medium-severity security flaw, designated as…

Read MoreCisco Alerts Users to Vulnerability in IOS and IOS XE Software Following Exploitation Attempts

OpenRefine’s Zip Slip Vulnerability Poses Risk of Malicious Code Execution by Attackers

A critical security vulnerability has been uncovered in OpenRefine, an open-source tool for data cleaning and transformation, potentially enabling arbitrary code execution on affected systems. The flaw, designated as CVE-2023-37476, holds a CVSS score of 7.8 and is categorized as a Zip Slip vulnerability. It affects versions 3.7.3 and earlier,…

Read MoreOpenRefine’s Zip Slip Vulnerability Poses Risk of Malicious Code Execution by Attackers