Vulnerabilities

Cybersecurity news and updates on the latest vulnerabilities. Read and educate yourself on the newest and latest exploits and CVEs. The Cyber Post brings you cyber security updates on the latest vulnerabilities relating to everyday software such as Google, Adobe, Microsoft, Cisco and more. Protect your corporate network or business by following TheCyberPost.coms daily security news.

Looking for a daily microsoft windows or Linux related vulnerability? Than the cyberpost is your source for computer and cyber related news and education. Stay concurrent on the latest cybersec news and world affairs.

German COVID-19 Contact-Tracing Vulnerability Allowed RCE

0
Bug hunters at GitHub Security Labs help shore up German contact tracing app security, crediting open source collaboration. A security vulnerability in the infrastructure underlying Germany’s official COVID-19 contact-tracing app,...

Magento Based Stores See Biggest Attack Due to 0day flaw

0
Well-known cybersecurity expert and founder of Sanguine Security (SanSec) Willem de Groot (Willem de Groot) warned of the largest ever campaign aimed at compromising online stores based on the e-commerce platform...

Malicious Code Bombs Target Amazon, Lyft, Slack, Zillow

0
Attackers have weaponized code dependency confusion to target internal apps at tech giants. Researchers have spotted malicious packages targeting internal applications for Amazon, Lyft, Slack and Zillow (among others) inside...

Critical Sophos Security Bug Allows RCE on Firewalls

0
The security vendor’s appliance suffers from an authentication-bypass issue. Cybersecurity stalwart Sophos has plugged a critical vulnerability in its firewall product, which could allow remote code-execution. The flaw, tracked as CVE-2022-1040,...

Follina Exploited by State-Sponsored Hackers

A government-aligned attacker tried using a Microsoft vulnerability to attack U.S. and E.U. government targets. Researchers have added state-sponsored hackers to the list of adversaries attempting to exploit Microsoft’s now-patched...

The Ultimate SaaS Security Posture Management (SSPM) Checklist

As one might expect, not all SSPM solutions are created equal. Monitoring, alerts, and remediation should sit at the heart of your SSPM solution. They ensure that any vulnerabilities...

Intel Plugs 29 Holes in CPUs, Bluetooth, Security

The higher-rated advisories focus on privilege-escalation bugs in CPU firmware: Tough to patch, hard to exploit, tempting to a savvy attacker. Intel has unleashed 29 security advisories to plug up...

Silver Peak SD-WAN Bugs Allow for Network Takeover

0
Three security vulnerabilities can be chained to enable unauthenticated remote code execution. Silver Peak’s Unity Orchestrator, a software-defined WAN (SD-WAN) management platform, suffers from three remote code-execution security bugs that...

Cisco DNA Center Bug Opens Enterprises to Remote Attack

0
The high-severity security vulnerability (CVE-2021-1257) allows cross-site request forgery (CSRF) attacks. A cross-site request forgery (CSRF) vulnerability in the Cisco Digital Network Architecture (DNA) Center could open enterprise users to...

Netgear Smart Switches Open to Complete Takeover

0
The Demon’s Cries, Draconian Fear and Seventh Inferno security bugs are high-severity entryways to corporate networks. Three severe Netgear vulnerabilities, codenamed Demon’s Cries, Draconian Fear and Seventh Inferno by the...
Error decoding the Instagram API json