SAP Patches Critical Flaw in its NetWeaver Application Server

This critical-severity bug – scoring 9.9 out of 10 on the CVSS v3 meter – can be exploited by a rogue authenticated user, or someone whose access has been hijacked, to inject arbitrary code.

Microsoft August 2020 Patch Tuesday fixes 120 vulnerabilities, two zero-days

Microsoft says attackers have used a Windows zero-day to spoof file signatures and another RCE in the Internet Explorer scripting engine to execute code on users' devices.

HDL Smart Devices in Homes and Buildings Exposed to Hacker Attacks

Vulnerabilities in HDL Automation smart products could be abused to take over user accounts and remotely control devices deployed in homes, commercial buildings, or hotels, SentinelOne reports.

Critical Flaws Affect Citrix Endpoint Management (XenMobile Servers)

According to Citrix, there are a total of 5 vulnerabilities affecting on-premise instances of XenMobile servers used in enterprises to manage all apps, devices, or platforms from one central location.

Adobe eliminates 11 critical bugs in Acrobat, Reader

For the August edition of Patch Tuesday, Adobe Systems today supplied fixes for 26 vulnerabilities — 11 critical — in Acrobat and Reader and one in its image manipulation software Lightroom Classic.

Hackers Combine Homoglyph Technique With Magecart Script To Target Victims

Hackers Combine Homoglyph Technique With Magecart Script To Target Victims - Cybersecurity news - Malware and Vulnerabilities
Researchers uncovered a new credit card skimming campaign linked to the Magecart group 8 that injects Inter skimming kit through the website favicon file to hide its malicious activities.

Maze Group’s Recent Assaults - A Quick Review

Maze Group’s Recent Assaults - A Quick Review - Cybersecurity news - Malware and Vulnerabilities
Lately, the Maze ransomware group has targeted a total of nine notable organizations across different sectors including healthcare, F&B, IT services, and others.

Script Based Malware: A New Attacker Trend on Internet Explorer

Researchers from Palo Alto Networks detected sophisticated script-based malware through Internet Explorer (IE) browser exploits that infect Windows OS users.

Peer-to-peer takes on a whole new meaning when used to spy on 3.7 million or more cameras, other IoT gear

IoT gadgets using vulnerable iLnkP2P implementations can be discovered and accessed by strangers, particularly if the default password has not been changed or is easily guessed.

Google Chrome Browser Bug Exposes Billions of Users to Data Theft

The vulnerability allows attackers to bypass Content Security Policy (CSP) protections and steal data from website visitors.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags