Home News Vulnerabilities

Vulnerabilities

Cybersecurity news and updates on the latest vulnerabilities. Read and educate yourself on the newest and latest exploits and CVEs. The Cyber Post brings you cyber security updates on the latest vulnerabilities relating to everyday software such as Google, Adobe, Microsoft, Cisco and more. Protect your corporate network or business by following TheCyberPost.coms daily security news.

Looking for a daily microsoft windows or Linux related vulnerability? Than the cyberpost is your source for computer and cyber related news and education. Stay concurrent on the latest cybersec news and world affairs.

WooCommerce Multi Currency Bug Allows Shoppers to Change eCommerce Pricing

0
The security vulnerability can be exploited with a malicious CSV file. A security vulnerability in the WooCommerce Multi Currency plugin could allow any customer to change the pricing for products...

Industrial Networks See Sharp Uptick in Hackable Security Holes

0
Claroty reports that adversaries, CISOs and researchers have all turned their attention to finding critical security bugs in ICS networks. It’s on: Adversaries, CISOs and researchers are all simultaneously involved...

Critical Security Hole Can Knock Smart Meters Offline

0
Unpatched Schneider Electric PowerLogic ION/PM smart meters are open to dangerous attacks. Critical security vulnerabilities in Schneider Electric smart meters could allow an attacker a path to remote code execution...

Cyberattack on UVM Health Network Impedes Chemotherapy Appointments

0
The cyberattack has halted chemotherapy, mammogram and screening appointments, and led to 300 staff being furloughed or reassigned. The University of Vermont (UVM) health network is scrambling to recover...

Discovery of 56 OT Device Flaws Blamed on Lackluster Security Culture

0
Culture of ‘insecure-by-design’ security is cited in discovery of bug-riddled operational technology devices. Researchers discovered 56 vulnerabilities affecting devices from 10 operational technology (OT) vendors, most of which they’ve attributed...

Black Hat: Security Bugs Allow Takeover of Capsule Hotel Rooms

0
A researcher was able to remotely control the lights, bed and ventilation in “smart” hotel rooms via Nasnos vulnerabilities. LAS VEGAS – A series of vulnerabilities in internet of things...

GrowDiaries Exposes Emails, Passwords of 1.4M Cannabis Growers

0
Cannabis journaling platform GrowDiaries exposed more than 3.4 million user records online, many from countries where pot is illegal. A database linked to GrowDiaries, an online community of cannabis growers, has exposed...

Top Threats your Business Can Prevent on the DNS Level

Web-filtering solutions, a must-have for businesses of any size, will protect your corporate network from multiple origins. The Domain Name System (DNS) is the underlying fabric that connects almost...

Monero-Mining Campaign Blue Mockingbird Exploits Web Apps

The cybercriminals are utilizing a deserialization weakness, CVE-2019-18935, to accomplish remote code execution before moving horizontally through the enterprise. A Monero digital currency mining effort has developed that abuses a...

Cloud Attacks Are Bypassing MFA, Feds Warn

0
CISA has issued an alert warning that cloud services at U.S. organizations are being actively and successfully targeted. The Feds are warning that cybercriminals are bypassing multi-factor authentication (MFA) and...
Error decoding the Instagram API json