All posts tagged "vulnerability"
-
Security
/ 2 weeks agoOpenClaw Patches Critical Flaw Allowing AI Agent Hijacking
A critical security vulnerability in the OpenClaw AI platform has been patched, the company confirmed. The flaw, if exploited, could have...
-
Security
/ 3 weeks agoVulnerabilities in Claude Code AI Assistant Risk Remote Attacks
cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic’s Claude Code, an artificial intelligence powered coding assistant. These flaws could allow...
-
Security
/ 3 weeks agoCISA Confirms Active Exploitation of FileZen Vulnerability
The U.S. cybersecurity and Infrastructure Security Agency (CISA) confirmed on Tuesday that a recently disclosed security flaw in the FileZen file...
-
Security
/ 3 weeks agoGitHub Codespaces Flaw Allowed Copilot to Leak Access Tokens
A security Vulnerability in GitHub Codespaces could have allowed attackers to steal sensitive repository access tokens by manipulating the GitHub Copilot...
-
Security
/ 3 weeks agoCISA Adds Two Roundcube Vulnerabilities to Exploited Flaws List
The U.S. cybersecurity and Infrastructure Security Agency (CISA) added two security vulnerabilities affecting Roundcube webmail software to its Known Exploited Vulnerabilities...
-
Security
/ 3 weeks agoCritical BeyondTrust Flaw Exploited for Web Shells, Data Theft
cybersecurity researchers report that threat actors are actively exploiting a severe vulnerability in BeyondTrust‘s enterprise security software to install backdoors, steal...
-
Security
/ 4 weeks agoDell RecoverPoint Zero-Day Exploited by Suspected China-Linked Group
A critical vulnerability in Dell’s data replication software has been actively exploited as a zero-day since mid-2024 by a suspected China-nexus...
-
Security
/ 4 weeks agoCISA Adds Four Actively Exploited Flaws to KEV Catalog
The U.S. cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) catalog on Tuesday, adding four security flaws....
-
Security
/ 4 weeks agoMajor Password Managers Vulnerable to Recovery Attacks
A recent academic study has identified significant vulnerabilities in several leading cloud-based password management services. The research found that under specific...
-
Security
/ 4 weeks agoBeyondTrust Vulnerability Actively Exploited by Attackers
Threat actors have begun actively exploiting a critical security vulnerability in BeyondTrust’s Remote Support and Privileged Remote Access software. The cybersecurity...

