Zoom urges users to patch two high severity vulnerabilities: CVE-2024-39818 (CVSSv3: 7.5), an information disclosure vulnerability that allows an authenticated user to perform information disclosure through network access and CVE-2024-39825 (CVSSv3: 8.5), a buffer overflow that allows an authenticated user to conduct an escalation of privilege using network access. Affected applications are Zoom Workplace Desktop App, Zoom Workplace VDI Client, Zoom Workplace App for Android and iOS, and Zoom Rooms Application for Windows, Mac, and iPad.
A judge has issued a ruling on the SEC's suit against SolarWinds. There are wins and losses for both sides, and lessons for the industry in the judge's words.
A critical 9.8 Java Deserialization Remote Code Execution vulnerability affects SolarWinds Web Help Desk, allowing attackers to run commands on the host machine. Read on to learn more and acquire the patch.
In one of the most significant data breaches in recent history, nearly 2.7 billion records obtained from a US-based data broker have been leaked on a popular hacking forum. The leak has sparked widespread concern over the potential for identity theft and fraud, leading to at least four class-action lawsuits against the broker.
When experts and laypeople talk about the threat of artificial intelligence (AI), there is a category of threat that receives almost no air time: the ways in which AI can be weaponized to accelerate existing cybersecurity threats. Learn more, ahead.
A vulnerability present in all major web browsers allows attackers to access sensitive services that are running on local devices running MacOS and Linux operating systems. Each of the major browsers has acknowledged the flaw and are working on updating standards that indirectly cause the problem.
The SonicWall Capture Labs research team has discovered a vulnerability in Apache OFBiz that allows pre-authenticated remote code execution. The vulnerability is being tracked as CVE-2024-38856 (CVSSv3.1: 9.8) and is considered a publicly disclosed zero-day vulnerability, though a patch was rapidly released and versions 18.12.15 and later remediate this vulnerability.
A ransomware attack on a not-for-profit blood supply center in Florida has hit more than 300 hospitals across the southeastern US, illustrating the cascading impact of IT outages in the healthcare supply chain and highlighting the continuing vulnerability of the sector to cybercrime.
A threat intelligence advisory has been released by Microsoft Threat Intelligence regarding a vulnerability impacting VMware’s ESXi bare metal hypervisor. A patch has been released for the vulnerability, which is categorized as CVE-2024-37085 (CVSS 3.1: 6.8), yet it is actively being used by threat actors (i.e., Storm-0506, Storm-1175, Octo Tempest, Manatee Tempest) in a ransomware campaign. The vulnerability is defined as an authentication bypass vulnerability, which allows a malicious actor with enough permissions to gain full access to an ESXi host through active directory (AD). This is done by re-creating the configured AD group (ESXi Admins) after it had been deleted from the active directory.