Security
Headlines
HeadlinesLatestCVEs

Tag

#auth

AEGON LIFE 1.0 Remote Code Execution

AEGON LIFE version 1.0 suffers from an unauthenticated remote code execution vulnerability.

Packet Storm
#vulnerability#web#windows#apple#linux#git#php#rce#perl#auth#chrome#webkit
AEGON LIFE 1.0 SQL Injection

AEGON LIFE version 1.0 suffers from a remote SQL injection vulnerability.

PHP Remote Code Execution

PHP versions prior to 8.3.8 suffer from a remote code execution vulnerability.

ZKTeco Biometric System Found Vulnerable to 24 Critical Security Flaws

An analysis of a hybrid biometric access system from Chinese manufacturer ZKTeco has uncovered two dozen security flaws that could be used by attackers to defeat authentication, steal biometric data, and even deploy malicious backdoors. "By adding random user data to the database or using a fake QR code, a nefarious actor can easily bypass the verification process and gain unauthorized access,"

Apple's AI Offering Makes Big Privacy Promises

Apple's guarantee of privacy on every AI transaction could influence trustworthy AI deployments.

4 Ways to Help a Security Culture Thrive

Creating and nurturing a corporate environment of proactive cybersecurity means putting people first — their needs, weaknesses, and skills.

Volume of Cyber-Insurance Claims Reaches New Heights

More claims are being made across the US and Canada compared with previous years, with healthcare organizations leading the way.

PoC Exploit Emerges for Critical RCE Bug in Ivanti Endpoint Manager

A new month, a new high-risk Ivanti bug for attackers to exploit — this time, an SQL injection issue in its centralized endpoint manager.

North Korea's Moonstone Sleet Widens Distribution of Malicious Code

The recently identified threat actor uses public registries for distribution and has expanded capabilities to disrupt the software supply chain.

AI Chatbot Fools Scammers & Scores Money-Laundering Intel

Experiment demonstrates how AI can turn the tables on cybercriminals, capturing bank account details of how scammers move stolen funds around the world.