Security Online

Critical Vulnerability Found in Mullvad VPN

X41 D-Sec GmbH, a leading cybersecurity firm, has completed a white-box penetration test of the Mullvad VPN application, revealing several vulnerabilities, including one rated as “critical” and two rated as “high” severity.

Golang Cryptography Library Flaw Risks Authorization Bypass

The vulnerability arises when applications incorrectly rely on the order or content of keys presented to the PublicKeyCallback function. Attackers can exploit this by presenting multiple public keys or authenticating with a different key.

Curl Vulnerability Exposes User Credentials in Redirects

The issue has been addressed in curl version 8.11.1. Users are strongly advised to upgrade to this version or apply the provided patch and rebuild curl. As a workaround, avoid using .netrc files together with redirects.

Careto APT Returns: Decade-Old Threat Resurfaces with New Sophistication

After a decade-long silence since its last known activity in 2014, Careto is back with new, sophisticated attacks targeting high-profile organizations, including governments, diplomatic entities, and research institutions.

Citrix NetScaler Under Siege: Significant Increase in Brute Force Attacks Observed

A significant increase in brute-force attacks targeting outdated and misconfigured Citrix NetScaler devices has been observed in Germany, prompting warnings from cybersecurity experts and organizations, including CERT Germany and the German BSI.

Apache Superset Vulnerability Exposes Sensitive Data to Unauthorized Modification

A newly discovered vulnerability in Apache Superset, a popular open-source business intelligence platform, could allow attackers to gain unauthorized write access to sensitive data.

Dell Warns of Critical Flaws in Enterprise Products, Including CVE-2024-37143 (CVSS 10)

These vulnerabilities, identified as CVE-2024-37143 and CVE-2024-37144, pose significant risks, ranging from remote code execution to information disclosure, with CVSS scores of 10.0 and 8.2, respectively.

Secure Email Gateways Fail to Stop Advanced Phishing Campaign Targeting Multiple Industries

To conceal their malicious intent, the attackers employed URL redirections via Google AMP and encoded parameters to create a complex trail. This multi-layered strategy not only bypassed SEGs but also complicated manual detection efforts.

Woffice WordPress Theme Vulnerabilities Could Lead to Full Site Takeovers

Patchstack identified two critical flaws in the Woffice Core plugin, which is required for the theme’s functionality. This includes a privilege escalation vulnerability (CVE-2024-43153) and an unauthenticated account takeover (CVE-2024-43234).

PDQ Deploy Vulnerability Exposes Admin Credentials: CERT/CC Issues Advisory

The flaw, which involves the insecure handling of administrator credentials during deployment processes, exposes organizations to potential lateral movement attacks and broader network compromises.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags