Articles tagged with: #vulnerability Clear filter
0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets

0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets

Cyber Security News cybersecuritynews.com

A critical security vulnerability has been discovered in Zendesk's Android SDK implementation that allows attackers to perform mass account takeovers without any user interaction. The flaw, which earned a $3,000 bug bounty payout, stems from predictable token generation mechanisms that enable unauthorized access to all Zendesk support tickets across affected organizations. Key Takeaways1. Predictable JWT

Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes

Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes

Cyber Security News cybersecuritynews.com

A comprehensive security analysis of vtenext CRM version 25.02 has revealed multiple critical vulnerabilities that allow unauthenticated attackers to bypass authentication mechanisms through three distinct attack vectors, ultimately leading to remote code execution on target systems. The Italian CRM solution, utilized by numerous small and medium enterprises across Italy, faces significant security exposure despite attempted

HTB Authority Machine Walkthrough | Easy HackTheBox Guide for Beginners

HTB Authority Machine Walkthrough | Easy HackTheBox Guide for Beginners

cybersecurity www.reddit.com

I wrote detailed walkthrough for HackTheBox machine Authority which showcases, cracking password-protected files, and password reuse vulnerabilities, and for Privilege escalation, one of the most common and easiest vulnerability in Active directory Certificate ESC1, and also extracting public and private key from administrator certificate and using it for other services. Perfect for beginners...

Critical Tableau Server Vulnerability Let Attackers Upload Malicious Files

Critical Tableau Server Vulnerability Let Attackers Upload Malicious Files

Cyber Security News cybersecuritynews.com

A critical security flaw in Tableau Server could enable attackers to upload and execute malicious files, potentially leading to complete system compromise. The vulnerability, tracked as CVE-2025-26496 with a CVSS score of 9.6, affects multiple versions of both Tableau Server and Tableau Desktop across Windows and Linux platforms. Key Takeaways1. Tableau Server allows malicious file

Building a Vulnerability Management Program From Scratch

Building a Vulnerability Management Program From Scratch

cybersecurity www.reddit.com

Hey everyone, I've recently been tasked with building a vulnerability management program from zero at my company, and I'd love to hear how others here have structured theirs. For context, we have a mid to large scale IT operations system including Cloud, Endpoint, Compliance, SOC, IAM, etc. and the current plan is to build the process top-down. My focus will be to create a baseline + questionnaire (5 - 10 questions for each stakeholder team) to capture expectations, develop an Incident...

PoC Exploit & Vulnerability Analysis Released for Apple 0-Day RCE Vulnerability

PoC Exploit & Vulnerability Analysis Released for Apple 0-Day RCE Vulnerability

Cyber Security News cybersecuritynews.com

A detailed proof-of-concept exploit and comprehensive vulnerability analysis have been released for CVE-2025-43300, a critical zero-click remote code execution flaw affecting Apple's image processing infrastructure. The vulnerability, discovered in Apple's implementation of JPEG Lossless Decompression within the RawCamera.bundle, allows attackers to achieve code execution without any user interaction through maliciously crafted DNG (Digital Negative) files.

Targeted Nakamoto: A Bitcoin Protocol to Balance Network Security and Carbon Emissions

Targeted Nakamoto: A Bitcoin Protocol to Balance Network Security and Carbon Emissions

cs.CR updates on arXiv.org arxiv.org

arXiv:2405.15089v4 Announce Type: replace Abstract: In a Proof-of-Work blockchain such as Bitcoin mining hashrate is increasing in the block reward. An increase in hashrate reduces network vulnerability to attack (a reduction in security cost) while increasing carbon emissions and electricity cost (an increase in externalities cost). This implies a tradeoff in total cost at different levels of hashrate and the existence of a hashrate interval where total cost is minimized. Targeted Nakamoto is...

Confusion is the Final Barrier: Rethinking Jailbreak Evaluation and Investigating the Real Misuse Threat of LLMs

Confusion is the Final Barrier: Rethinking Jailbreak Evaluation and Investigating the Real Misuse Threat of LLMs

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.16347v1 Announce Type: new Abstract: With the development of Large Language Models (LLMs), numerous efforts have revealed their vulnerabilities to jailbreak attacks. Although these studies have driven the progress in LLMs' safety alignment, it remains unclear whether LLMs have internalized authentic knowledge to deal with real-world crimes, or are merely forced to simulate toxic language patterns. This ambiguity raises concerns that jailbreak success is often attributable to a...

SoK: Understanding the Fundamentals and Implications of Sensor Out-of-band Vulnerabilities

SoK: Understanding the Fundamentals and Implications of Sensor Out-of-band Vulnerabilities

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.16133v1 Announce Type: new Abstract: Sensors are fundamental to cyber-physical systems (CPS), enabling perception and control by transducing physical stimuli into digital measurements. However, despite growing research on physical attacks on sensors, our understanding of sensor hardware vulnerabilities remains fragmented due to the ad-hoc nature of this field. Moreover, the infinite attack signal space further complicates threat abstraction and defense. To address this gap, we...

CIA+TA Risk Assessment for AI Reasoning Vulnerabilities

CIA+TA Risk Assessment for AI Reasoning Vulnerabilities

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.15839v1 Announce Type: new Abstract: As AI systems increasingly influence critical decisions, they face threats that exploit reasoning mechanisms rather than technical infrastructure. We present a framework for cognitive cybersecurity, a systematic protection of AI reasoning processes from adversarial manipulation. Our contributions are threefold. First, we establish cognitive cybersecurity as a discipline complementing traditional cybersecurity and AI safety, addressing...

Towards Stealthy and Effective Backdoor Attacks on Lane Detection: A Naturalistic Data Poisoning Approach

Towards Stealthy and Effective Backdoor Attacks on Lane Detection: A Naturalistic Data Poisoning Approach

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.15778v1 Announce Type: new Abstract: Deep learning-based lane detection (LD) plays a critical role in autonomous driving and advanced driver assistance systems. However, its vulnerability to backdoor attacks presents a significant security concern. Existing backdoor attack methods on LD often exhibit limited practical utility due to the artificial and conspicuous nature of their triggers. To address this limitation and investigate the impact of more ecologically valid backdoor...

ICS Threats Are Evolving. Training Must Too.

ICS Threats Are Evolving. Training Must Too.

SANS ICS Security www.youtube.com

Tim Conway, SANS ICS Curriculum Lead, and Dennis Kirby, SANS CEO, explain why hands-on learning is critical for defending industrial systems. From real-world controller kits to evolving threats like AI and legacy vulnerabilities, SANS brings practical, global ICS/OT cyber training to the front lines. 🏭 ⚙️ Learn to defend what makes, moves, and powers the world. #ICS #OT #Cybersecurity #CriticalInfrastructure #SANS #IndustrialCyber #OperationalTechnology #SCADA #Cyber #handsonlearning

Weekly Cybersecurity News Recap : Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks

Weekly Cybersecurity News Recap : Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks

Cyber Security News cybersecuritynews.com

This past week was packed with high-severity disclosures and active exploitation reports across the global threat landscape. At the forefront, Apple rushed out emergency patches for yet another zero-day vulnerability affecting iOS, iPadOS, and macOS devices. The flaw, reportedly being exploited in the wild, highlights the continued trend of nation-state and surveillance actors leveraging critical

Heads up if you admin FortiWeb (CVE-2025-52970)

Heads up if you admin FortiWeb (CVE-2025-52970)

cybersecurity www.reddit.com

FortiWeb has recently released details of a vulnerability (CVE-2025-52970) - for which a technical exploit write-up exists but no public POC as of yet. Someone has now reversed the write-up and is actively attempting exploitation. I run a set of FortiWeb honeypots and got detections on this on three separate honeypots: GET /api/v2.0/system/status.systemstatus HTTP/1.1 Host: xxxxxxx User-Agent: Mozilla/5.0 (CentOS; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0...

Sneaking Invisible Instructions by Developers in Windsurf

Sneaking Invisible Instructions by Developers in Windsurf

Embrace The Red embracethered.com

Imagine a malicious instruction hidden in plain sight, invisible to you but not to the AI. This is a vulnerability discovered in Windsurf Cascade, it follows invisible instructions. This means there can be instructions in a file or result of a tool call that the developer cannot see, but the LLM does. Some LLMs interpret invisible Unicode Tag characters as instructions, which can lead to hidden prompt injection. As far as I can tell the Windsurf SWE-1 model can also "see" these invisible...

GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets

GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets

The Hacker News thehackernews.com

Cybersecurity researchers are calling attention to multiple campaigns that leverage known security vulnerabilities and expose Redis servers to various malicious activities, including leveraging the compromised devices as IoT botnets, residential proxies, or cryptocurrency mining infrastructure. The first set of attacks entails the exploitation of CVE-2024-36401 (CVSS score: 9.8), a critical