Vulnerabilities

Cybersecurity news and updates on the latest vulnerabilities. Read and educate yourself on the newest and latest exploits and CVEs. The Cyber Post brings you cyber security updates on the latest vulnerabilities relating to everyday software such as Google, Adobe, Microsoft, Cisco and more. Protect your corporate network or business by following TheCyberPost.coms daily security news.

Looking for a daily microsoft windows or Linux related vulnerability? Than the cyberpost is your source for computer and cyber related news and education. Stay concurrent on the latest cybersec news and world affairs.

ZOOM Zero-Day Vulnerability Allows Remote Code Execution

0
A zero-day vulnerability in Zoom for Windows may be exploited by an attacker to execute arbitrary code on a victim’s computer. The attack doesn’t trigger a security warning and...

LEADTOOLS Remote Code Execution Vulnerability

WEDNESDAY, JULY 1, 2020 Vulnerability Spotlight: Remote code execution vulnerabilities in LEADTOOLS 20 Cory Duplantis of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered a remote code...

Palo Alto Networks disclose major bug that lets hackers bypass authentication on its firewall...

0
US Cyber Command says foreign hackers will most likely exploit new PAN-OS security bug By Catalin Cimpanu for Zero Day US Cyber Command said today that foreign state-sponsored hacking groups are likely to exploit...

Vulnerabilities in old GTP protocol could affect 4G and 5G networks

0
Experts cautioned that problems in the GPRS Tunneling Protocol (GTP) could affect the operation of 4G and 5G networks. In reports published  last week  and in  December 2019, Positive Technologies and A10 Networks described...

Misconfigured Kubernetes Target Of XMRig Mining Campaign

0
XMRig Campaign Target Misconfigured Kubernetes to Mine Cryptocurrency Kubernetes clusters, due to their cloud computing capabilities and widespread use, are the perfect target for crypto-mining campaigns. A widespread XMRig Monero-mining...

RCE Vulnerability Detected In Firefox SharedWorker Component

0
The vulnerability affects Firefox version 76.0a1 x64 and is contained in the SharedWorker component. Specialists from the Cisco Talos team reported a critical vulnerability (CVE-2020-12405) in the Mozilla Firefox browser, the operation...

Facebook Sponsors 0day Exploit For Tails OS To Help The FBI Catch A Pedophile

0
Facebook helped the FBI catch a pedophile and sponsored the creation of a 0-day exploit for Tails An amazing story was published on its pages by Vice Motherboard . It turned out that...

Strange Cmd.exe Command Allows Execution of Arbitrary Commands

0
Security researcher Julian Horoszkiewicz discovered a cmd.exe command line shell vulnerability that could allow arbitrary commands to execute. In search of new attack vectors allowing the introduction of commands in Windows, Khoroshkevich...

Denial Of Service Vulnerability in VMWare Workstation 15

Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered a denial-of-service vulnerability in VMware Workstation 15. VMware allows users to set up virtual machines and...

StrandHogg 2.0 – Android Flaw Leaves 1 Billion Devices Vulnerable to Application Hijacking

A security vulnerability affecting Android that malicious apps can exploit to masquerade as any other app installed on a targeted device to display fake interfaces to the users, tricking them into...
Error decoding the Instagram API json