Security
Headlines
HeadlinesLatestCVEs

Tag

#log4j

Iranian Hackers Compromised a U.S. Federal Agency’s Network Using Log4Shell Exploit

Iranian government-sponsored threat actors have been blamed for compromising a U.S. federal agency by taking advantage of the Log4Shell vulnerability in an unpatched VMware Horizon server. The details, which were shared by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), come in response to incident response efforts undertaken by the authority from mid-June through mid-July 2022

The Hacker News
#vulnerability#windows#microsoft#apache#git#java#rce#vmware#log4j#auth#The Hacker News
Are We Ready for AI-Generated Code?

Autocompleted code is convenient and quick, but it may expose your organization to security and compliance risks.

Researchers Sound Alarm on Dangerous BatLoader Malware Dropper

BatLoader has spread rapidly to roost in systems globally, tailoring payloads to its victims.

Rezilion Expands Dynamic SBOM Capability to Support Windows Environments

Technology consolidates Windows and Linux software risk together in one UI, helping teams manage vulnerabilities and comply with new regulatory standards.

Microsoft Quashes Bevy of Actively Exploited Zero-Days for November Patch Tuesday

Long-awaited security fixes for ProxyNotShell and Mark of the Web bypasses are part of a glut of actively exploited zero-day vulnerabilities and other critical flaws that admins need to prioritize in the coming hours.

Retail Sector Prepares for Annual Holiday Cybercrime Onslaught

Retailers and hospitality companies expect to battle credential harvesting, phishing, bots, and various malware variants.

Supply Chain Attack Pushes Out Malware to More than 250 Media Websites

TA569 has modified the JavaScript of a legitimate content and advertising engine used by news affiliates, in order to spread the FakeUpdates initial access framework.

CVE-2022-3575: Frauscher PSIRT

Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device.