The nation’s cyber defense agency is continuing to drive a major effort to shift security responsibilities from users to software providers. The Cybersecurity and Infrastructure Security...
Identity and access management company Okta released a warning about social engineering attacks targeting IT service desk agents at U.S.-based customers in an attempt to trick them into resetting multi-factor authentication...
Hackers are exploiting two recent MinIO vulnerabilities to breach object storage systems and access private information, execute arbitrary code, and potentially take over servers. MinIO is...
Pen testing, also known as “ethical hacking,” involves a team of cybersecurity professionals tasked to test the resilience of an organization’s security systems. Unfortunately, traditional web application...
Three critical-severity remote code execution vulnerabilities impact ASUS RT-AX55, RT-AX56U_V2, and RT-AC86U routers, potentially allowing threat actors to hijack devices if security updates are not installed....
Multiple Information Disclosure vulnerabilities were discovered in the IBM Security Verify Information Queue, which can reveal several internal product details. This information can then be used to conduct...
Adobe ColdFusion is a Java-based, commercial web app development platform using CFML for server-side programming. ColdFusion is primarily known for its tag-based approach, which is unique....
Proof-of-concept exploit code has been released for a critical SSH authentication bypass vulnerability in VMware’s Aria Operations for Networks analysis tool (formerly known as vRealize Network...
We are glad to present the most recent news on cybersecurity in this week’s Threat and Vulnerability Roundup from Cyber Writes. The latest attack techniques, significant...
Cybercriminals are increasingly leveraging extreme weather events to launch attacks on critical infrastructure sectors. Cybersecurity experts say critical infrastructure operators can leverage a set of traditional...