Topic: software vulnerability

  • Critical n8n Vulnerabilities Exposed with Public Exploits

    Critical n8n Vulnerabilities Exposed with Public Exploits

    Critical vulnerabilities (CVE-2026-25049) in the n8n workflow platform allow users with workflow edit permissions to execute arbitrary code and fully compromise the host server, including stealing credentials. The flaws stem from incomplete AST-based sandboxing and a type-confusion vulnerability ...

    Read More »
  • Critical RCE Flaw in Trend Micro Apex Central: Patch Now

    Critical RCE Flaw in Trend Micro Apex Central: Patch Now

    A critical vulnerability (CVE-2025-69258) in Trend Micro's Apex Central console allows unauthenticated attackers to remotely execute malicious code with the highest SYSTEM privileges. The flaw, discovered by Tenable, is exploited by sending a crafted message to a specific port, forcing the system...

    Read More »
  • Abandoned Rust Library Flaw Sparks RCE Attack Risk

    Abandoned Rust Library Flaw Sparks RCE Attack Risk

    A critical security vulnerability (CVE-2025-62518) in the abandoned async-tar and tokio-tar Rust libraries allows remote code execution via desynchronization during TAR archive extraction, enabling attackers to insert malicious entries without authentication. The flaw, named TARmageddon, arises f...

    Read More »
  • Fancy Bear Targets Ukraine, EU with Microsoft Office Flaw

    Fancy Bear Targets Ukraine, EU with Microsoft Office Flaw

    The Russian-linked cyber group Fancy Bear is exploiting a critical Microsoft Office vulnerability (CVE-2026-21509) to target Ukrainian and EU organizations, deploying malware via malicious documents. The campaign uses a sophisticated attack chain involving COM hijacking and the Covenant C2 framew...

    Read More »
  • Unpatched Fortra GoAnywhere Flaw Risks Full System Takeover

    Unpatched Fortra GoAnywhere Flaw Risks Full System Takeover

    A critical vulnerability (CVE-2025-10035) in Fortra's GoAnywhere MFT platform allows full system takeover via a deserialization flaw in the License servlet, requiring immediate patching. Exploitation necessitates access to the admin console, echoing a 2023 incident where exposed consoles led to w...

    Read More »
  • Notepad's Markdown Update Comes With a Critical RCE Flaw

    Notepad's Markdown Update Comes With a Critical RCE Flaw

    A high-severity vulnerability (CVE-2026-20841) in Microsoft Notepad's Markdown feature allows remote code execution if a user opens a malicious file and clicks an embedded link. Microsoft has patched the flaw, noting no current active exploits, but its impact is significant due to Notepad's ubiqu...

    Read More »
  • Russian Hackers Attack Using New Microsoft Office Bug

    Russian Hackers Attack Using New Microsoft Office Bug

    Russian state-backed hackers (APT28/Fancy Bear) are actively exploiting a patched Microsoft Office vulnerability (CVE-2026-21509) in targeted attacks against Ukrainian and EU entities, using phishing emails with malicious documents. The attack delivers sophisticated malware via a complex WebDAV c...

    Read More »
  • Ivanti warns of critical code execution flaw in Endpoint Manager

    Ivanti warns of critical code execution flaw in Endpoint Manager

    A critical vulnerability (CVE-2025-10573) in Ivanti's Endpoint Manager allows unauthenticated attackers to execute arbitrary code by tricking an administrator into viewing a compromised dashboard. Ivanti has released a patch, but the risk is heightened as hundreds of EPM instances are exposed onl...

    Read More »
  • Urgent: Active Attacks Target Unpatched Gladinet Flaw (CVE-2025-11371)

    Urgent: Active Attacks Target Unpatched Gladinet Flaw (CVE-2025-11371)

    A critical unauthenticated Local File Inclusion vulnerability (CVE-2025-11371) is actively being exploited, allowing attackers to remotely access any file on systems using Gladinet's CentreStack and Triofox platforms without credentials. Security researchers at Huntress confirmed real-world attac...

    Read More »
  • Microsoft GoAnywhere Bug Fuels Medusa Ransomware Attacks

    Microsoft GoAnywhere Bug Fuels Medusa Ransomware Attacks

    A critical vulnerability (CVE-2025-10035) in Fortra's GoAnywhere platform allows unauthenticated attackers to execute remote code, prompting urgent patching and removal of internet exposure. The flaw was exploited as a zero-day by Storm-1175, who used legitimate tools for reconnaissance and deplo...

    Read More »
  • Fortra GoAnywhere Zero-Day Exploited: Critical Flaw CVE-2025-10035

    Fortra GoAnywhere Zero-Day Exploited: Critical Flaw CVE-2025-10035

    A critical vulnerability (CVE-2025-10035) in Fortra's GoAnywhere platform, scoring 10.0 in severity, was exploited in zero-day attacks due to a deserialization flaw, with patches released on September 15, 2025. Evidence shows exploitation began as early as September 10, 2025, giving attackers an ...

    Read More »
  • Ransomware Attack Hits SmarterMail via Critical Flaw

    Ransomware Attack Hits SmarterMail via Critical Flaw

    A ransomware attack on SmarterTools began via an unpatched, employee-created virtual machine running outdated SmarterMail software, which allowed lateral movement into office and data center networks. The breach, attributed to the Warlock group exploiting a known vulnerability, led the company to...

    Read More »
  • How an AWS Outage Brought Down the Internet

    How an AWS Outage Brought Down the Internet

    A major AWS outage caused by Domain System Registry failures in its DynamoDB service disrupted internet services for 15 hours, revealing widespread reliance on cloud infrastructure and its vulnerabilities. The US Justice Department indicted a criminal group for a gambling scam using hacked card s...

    Read More »
  • SmarterTools Breached by Hackers Exploiting Own Software Flaw

    SmarterTools Breached by Hackers Exploiting Own Software Flaw

    The Warlock ransomware gang breached SmarterTools by exploiting an unpatched SmarterMail server, demonstrating how a single overlooked system can compromise an entire network. Attackers used a specific authentication bypass vulnerability to gain access, moved laterally with Windows tools, but wer...

    Read More »