The manufacturing industry is the most targeted industry for cyberattacks and this has has now been the case for four […]
Category: vulnerabilities
Critical CitrixBleed 2 vulnerability has been under active exploit for weeks
A critical vulnerability allowing hackers to bypass multifactor authentication in network management devices made by Citrix has been actively exploited […]
Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them.
Skip to content A skeleton key for hackers The publicly available exploits provide a near-universal way to bypass key protections. […]
Critical vulnerabilities found across all cloud providers
A new report from CyCognito highlights critical security vulnerabilities across cloud-hosted material, revealing that one in three easily exploitable vulnerabilities […]
Open source project curl is sick of users submitting “AI slop” vulnerabilities
Ars has reached out to HackerOne for comment and will update this post if we get a response. “More tools […]
Microsoft vulnerabilities hit a record high in 2024
The latest annual Microsoft Vulnerabilities Report from BeyondTrust, reveals a record-breaking number of reported vulnerabilities last year. Total vulnerabilities reached […]
Organizations fix under half of exploitable vulnerabilities
The latest State of Pentesting report from Cobalt reveals that organizations are fixing less than half of all exploitable vulnerabilities, […]
Traditional vulnerability assessment falls short on third-party risks
As organizations increasingly rely on third-party vendors, open-source components, and cloud services to bolster efficiency and scalability, they also open […]
Here comes the sun — along with the solar power vulnerabilities
We’re always being encouraged to be greener in our energy usage these days and many people have turned to solar […]
Threat posed by new VMware hyperjacking vulnerabilities is hard to overstate
Three critical vulnerabilities in multiple virtual-machine products from VMware can give hackers unusually broad access to some of the most […]
