Exploit Code Published for Remote Root Flaw in VMware Logging Software

VMware confirmed that exploit code for CVE-2023-20864 has been published, underscoring the urgency for enterprise network admins to apply available patches.
The post Exploit Code Published for Remote Root Flaw in VMware Logging Software appeared first … Continue reading Exploit Code Published for Remote Root Flaw in VMware Logging Software

OWASP SwSec 5D Tool Provides SDLC Maturity Ratings, Aids Software Supply Chain

SwSec 5D framework aims to provide a roadmap for secure software development, and its use would help improve security in the software supply chain.
The post OWASP SwSec 5D Tool Provides SDLC Maturity Ratings, Aids Software Supply Chain appeared first o… Continue reading OWASP SwSec 5D Tool Provides SDLC Maturity Ratings, Aids Software Supply Chain

Truebot Hackers Exploiting Netwrix Auditor Flaw: CISA, FBI Alert

Hackers linked to the Truebot malware are exploiting a year-old Netwrix Auditor flaw to break into organizations in the U.S. and Canada.
The post Truebot Hackers Exploiting Netwrix Auditor Flaw: CISA, FBI Alert appeared first on SecurityWeek.
Continue reading Truebot Hackers Exploiting Netwrix Auditor Flaw: CISA, FBI Alert

Employees worry less about cybersecurity best practices in the summer

IT teams are struggling to monitor and enforce BYOD (Bring Your Own Device) policies during summer months when more employees are often traveling or working remotely, according to ThreatX. With more endpoints and applications in use, and often personal… Continue reading Employees worry less about cybersecurity best practices in the summer

Critical WordPress Plugin Vulnerabilities Impact Thousands of Sites

Two critical-severity authentication bypass vulnerabilities in WordPress plugins with tens of thousands of installations.
The post Critical WordPress Plugin Vulnerabilities Impact Thousands of Sites appeared first on SecurityWeek.
Continue reading Critical WordPress Plugin Vulnerabilities Impact Thousands of Sites

Fake Security Researcher Accounts Pushing Malware Disguised as Zero-Day Exploits

Fake security researcher accounts seen distributing malware disguised as Chrome, Signal, WhatsApp, Discord and Exchange zero-day exploits.
The post Fake Security Researcher Accounts Pushing Malware Disguised as Zero-Day Exploits appeared first on Secu… Continue reading Fake Security Researcher Accounts Pushing Malware Disguised as Zero-Day Exploits