AI Vulnerabilities
-
Security Researchers Warn of Bluetooth Vulnerabilities in Popular Headphones
Security researchers have identified vulnerabilities in Airoha’s Bluetooth products, putting a wide range of earbuds and headphones at risk of unauthorized access and control. Airoha has provided fixes, but manufacturers must implement updates to secure their devices.
-
SinoTrack GPS Vulnerabilities Expose Vehicles to Potential Attacks
Vulnerabilities in the SinoTrack GPS tracking platform may allow attackers to track vehicle locations and control vehicle functions. CISA warns users to change default passwords and protect device identifiers.
-
CISA Warns of Ransomware Threats Exploiting SimpleHelp Vulnerabilities
CISA warns that ransomware actors are exploiting unpatched SimpleHelp vulnerabilities to target utility billing software providers, urging organizations to update their systems and implement security measures to prevent attacks.
-
GitLab Issues Security Patches Addressing High-Severity Vulnerabilities
GitLab has released vital security updates addressing multiple high-severity vulnerabilities that allow account takeovers and malicious job injections in its DevSecOps platform. The company urges immediate upgrades to mitigate these risks.
-
Adobe Issues Major Security Patch Addressing 254 Vulnerabilities in Software Products
Adobe has released updates addressing 254 vulnerabilities, including major flaws in the Experience Manager (AEM) with implications for arbitrary code execution and privilege escalation, urging users to update to safeguard their systems.
-
Hewlett Packard Enterprise Issues Critical Security Warning for StoreOnce Backup Solutions
Hewlett Packard Enterprise has issued a security warning regarding eight vulnerabilities in its StoreOnce backup solutions, including a critical authentication bypass flaw that could allow for exploitation of other vulnerabilities.
-
New Vulnerabilities Discovered in Linux Core Dump Handlers Pose Security Risks
Two vulnerabilities in Linux core dump handlers could allow local attackers to access sensitive information, prompting security warnings from Qualys and other vendors. Mitigation measures are being recommended to protect user data.
-
NASA Faces Security Risks from Open Source Software Vulnerabilities
Recent findings by security researcher Leon Juranić reveal that NASA’s in-house developed open source software harbors serious vulnerabilities, posing risks of potential system breaches. With inadequate vulnerability reporting mechanisms and security practices observed, the findings call for immediate improvements to safeguard against cyber threats.
-
NIST Introduces New Metric for Identifying Likely Exploited Vulnerabilities in Cybersecurity
NIST has introduced a new metric, Likely Exploited Vulnerabilities (LEV), to help organizations identify which software vulnerabilities are most likely to have been exploited in cyberattacks, calling for collaboration from the cybersecurity community to validate this methodology.
-
Mozilla Addresses Critical Vulnerabilities in Firefox Browser
Mozilla has issued critical security updates for Firefox to address two vulnerabilities exploited at Pwn2Own Berlin, which could allow attackers to access sensitive data or execute unauthorized code.