exploited

18 Articles
Security flaw in vBulletin forum software exploited by hackers
Tech

Security flaw in vBulletin forum software exploited by hackers

Security researchers find two flaws in vBulletin Both are critical in severity, and can be chained for RCE One of the flaws is...

Cisco security flaw exploited to build botnet of thousands of devices
Tech

Cisco security flaw exploited to build botnet of thousands of devices

Sekoia researchers warn of new ViciousTrap botnet So far, it compromised more than 5,000 dated Cisco routers The devices are vulnerable to an...

Chrome patched this bug, but CISA says it’s still actively exploited
Tech

Chrome patched this bug, but CISA says it’s still actively exploited

Google patched a new Chrome bug recently Now, CISA added that vulnerability to KEV, signaling abuse in the wild Federal agencies have three...

SAP patches recently exploited zero-day in wake of NetWeaver server attacks
Tech

SAP patches recently exploited zero-day in wake of NetWeaver server attacks

SAP fixed CVE-2025-42999, a 9.1/10 vulnerability in NetWeaver This one was chained with CVE-2025-31324, which was fixed in April Fortune 500 companies are...

Craft CMS zero-day exploited to compromise hundreds of vulnerable servers
Tech

Craft CMS zero-day exploited to compromise hundreds of vulnerable servers

Researchers discovered two critical-severity zero-days in Craft CMS Criminals are allegedly chaining them together to gain access Some 300 sites already fell victim...

WordPress plugin auth bypass exploited almost immediately after disclosure
Tech

WordPress plugin auth bypass exploited almost immediately after disclosure

A bug in OttoKit allows threat actors to create new admin accounts The bug can lead to full website takeover More than 100,000...

CrushFTP vulnerability exploited in the wild, added to CISA KEV database
Tech

CrushFTP vulnerability exploited in the wild, added to CISA KEV database

A critical flaw was discovered in file transfer tool CrushFTP Experts claim the issue was being abused in the wild CISA added the...

Actively exploited vulnerabilities patched on Android in latest security update
Tech

Actively exploited vulnerabilities patched on Android in latest security update

Google’s new advisory details 62 vulnerabilities Some of them are deemed critical, and for some no user interaction is required At least two...

Key trusted Microsoft platform exploited to enable malware, experts warn
Tech

Key trusted Microsoft platform exploited to enable malware, experts warn

Trusted Signing, a Microsoft certificate-signing service, is being abused by criminals, researchers are saying The criminals are signing malware with short-lived, three-day certificates...