Vulnerabilities

Cybersecurity news and updates on the latest vulnerabilities. Read and educate yourself on the newest and latest exploits and CVEs. The Cyber Post brings you cyber security updates on the latest vulnerabilities relating to everyday software such as Google, Adobe, Microsoft, Cisco and more. Protect your corporate network or business by following TheCyberPost.coms daily security news.

Looking for a daily microsoft windows or Linux related vulnerability? Than the cyberpost is your source for computer and cyber related news and education. Stay concurrent on the latest cybersec news and world affairs.

Adobe Critical Vulnerability Patch Released

Adobe has released an unscheduled critical vulnerability fix ( CVE-2020-9586 ) in its Adobe Character Animator motion capture application. Exploiting the vulnerability allows an attacker to remotely execute code on a vulnerable...

How A College Student Made 10k From Bug Bounties

Author: Tilson Galloway API keys, passwords, and customer data are accidentally posted to GitHub every day. Hackers use these keys to login to servers, steal personal information, and rack up absurd...

The FBI, DHS & CISA Top 10 Most Exploited Vulnerabilities

Two US cyber-security agencies published this week a list of the top 10 most commonly exploited software vulnerabilities across the last four years, between 2016 and 2019. The report, authored...

IoT Security, Attacks And The Industrial Systems at Risk

Hackers could target smart manufacturing and other industrial environments with new and unconventional cyber attacks designed to exploit vulnerabilities in ecosystems which are supporting the Industrial Internet of Things (IIoT) according...

A New Critical Vulnerability Affects vBulletin Forums – Update Now

If you are running an online discussion forum based on vBulletin software, make sure it has been updated to install a newly issued security patch that fixes a critical...

Thunderbolt Devices Left Vulnerable To Physical Attacks

The Thunderspy attack affects millions of PCs released before 2019. A specialist at Eindhoven University of Technology in the Netherlands has demonstrated a new attack method on Windows or Linux computers with...

Monero-Mining Campaign Blue Mockingbird Exploits Web Apps

The cybercriminals are utilizing a deserialization weakness, CVE-2019-18935, to accomplish remote code execution before moving horizontally through the enterprise. A Monero digital currency mining effort has developed that abuses a...

Schneider Electric Detects Another Stuxnet-like Vulnerability

Trustwave discovered another Stuxnet-like vulnerability in Schneider Electric software, in particular in EcoStruxure Machine Expert (formerly SoMachine), which allows creating projects on Modicon M221 programmable logic controllers. The vulnerability description CVE-2020-7489 is exactly the...

Algolia Search Service Hacked Using Salt Vulnerability

 May 8, 2020 The search service Algolia reported a hack during which attackers exploited a vulnerability in the software for setting up Salt servers and gained access to the service infrastructure. The criminals...
Error decoding the Instagram API json