Vulnerabilities

Cybersecurity news and updates on the latest vulnerabilities. Read and educate yourself on the newest and latest exploits and CVEs. The Cyber Post brings you cyber security updates on the latest vulnerabilities relating to everyday software such as Google, Adobe, Microsoft, Cisco and more. Protect your corporate network or business by following TheCyberPost.coms daily security news.

Looking for a daily microsoft windows or Linux related vulnerability? Than the cyberpost is your source for computer and cyber related news and education. Stay concurrent on the latest cybersec news and world affairs.

Google: 2021 was a Banner Year for Exploited 0-Day Bugs

0
Last year, Google Project Zero tracked a record 58 exploited-in-the-wild zero-day security holes. Google Project Zero reported 58 exploited zero-day vulnerabilities in 2021, a record in the short time...

Argo CD Security Bug Opens Kubernetes Cloud Apps to Attackers

0
The popular continuous-delivery platform has a path-traversal bug (CVE-2022-24348) that could allow cyberattackers to hop from one application ecosystem to another. A high-severity security vulnerability in Argo CD can enable...

Where the Latest Log4Shell Attacks Are Coming From

0
Analysts find at least 10 Linux botnets actively exploiting Log4Shell flaw. Cybersecurity professionals across the world have been scrambling to shore up their systems against a critical remote code-execution (RCE)...

‘Trojan Source’ Hides Invisible Bugs in Source Code

0
The old RLO trick of exploiting how Unicode handles script ordering and a related homoglyph attack can imperceptibly switch the real name of malware. Researchers have found a new way...

Tesla Hacked and Stolen Again Using Key Fob

0
Belgian researchers demonstrate third attack on the car manufacturer’s keyless entry system, this time to break into a Model X within minutes. Researchers have demonstrated for the third time how...

iPhone Users Urged to Update to Patch 2 Zero-Days

0
Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack. Apple is urging...

CISA Orders Federal Agencies to Fix Actively Exploited Windows Bug

0
Feb. 18 is the deadline to patch a bug that affects all unpatched versions of Windows 10 and requires zero user interaction to exploit. CISA is putting the thumbscrews...

Critical WordPress-Plugin Bug Found in ‘Orbit Fox’ Allows Site Takeover

0
Two security vulnerabilities — one a privilege-escalation problem and the other a stored XSS bug — afflict a WordPress plugin with 40,000 installs. Two vulnerabilities (one critical) in a...

Threat Actors Can Exploit Windows RDP Servers to Amplify DDoS Attacks

0
Netscout researchers identify more than 14,000 existing servers that can be abused by ‘the general attack population’ to flood organizations’ networks with traffic. Cybercriminals can exploit Microsoft Remote Desktop Protocol...

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

0
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. New research indicates that over 80,000 Hikvision surveillance cameras in the world...
Error decoding the Instagram API json