Asahi Group Holdings has confirmed that a cyberattack in September has affected approximately 1.9 million individuals, highlighting the significant impact of the breach on personal data security. The incident raises concerns about the vulnerability of large corporations to cyber threats and the potential risks to consumer information.
Articles tagged "Vulnerability"
Found 43 articles
Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cato Networks has identified a new vulnerability known as HashJack, which exploits the '#' symbol in URLs to execute malicious commands in AI browsers. While Microsoft and Perplexity have addressed this flaw, Google's Gemini remains vulnerable, highlighting a significant risk for users of that platform.
BleepingComputer
A security engineer's scan of 5.6 million public GitLab repositories revealed over 17,000 exposed secrets across more than 2,800 unique domains. This significant exposure poses a serious risk to organizations, as these secrets can potentially lead to unauthorized access and data breaches.
Researchers have identified vulnerabilities in legacy Python packages that could lead to supply chain attacks through domain takeover risks. The issue is linked to bootstrap files from the zc.buildout automation tool, highlighting the need for vigilance in managing dependencies in software development.
Asahi Group Holdings, Ltd reported a significant cybersecurity incident where hackers stole personal data of approximately 2 million customers and employees before launching a ransomware attack that severely disrupted its operations in Japan. This breach highlights the increasing vulnerability of organizations to cyber threats and the potential impact on customer trust and business continuity.
A vulnerability in the 'node-forge' package allows attackers to bypass signature verifications by crafting seemingly valid data. This flaw poses a significant risk to applications relying on this cryptography library for secure data handling. Immediate attention is required to mitigate potential exploitation of this vulnerability.
Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
New research highlights a significant security vulnerability in Microsoft Teams B2B Guest Access, allowing attackers to circumvent Defender for Office 365 protections with just a single invitation. This flaw poses a serious risk of malware attacks on users, emphasizing the need for immediate attention to security protocols within the platform.
The article highlights that over half of surveyed organizations lack confidence in their ability to secure non-human identities (NHIs), indicating a significant gap between the adoption of these identities and the necessary protective measures. This situation poses a serious risk to cybersecurity as NHIs become more prevalent in enterprise environments.
The article highlights the risks associated with using community-maintained tools like Chocolatey and Winget for system updates. While these tools offer convenience for IT teams, their open nature allows anyone to modify packages, potentially exposing systems to vulnerabilities. This duality presents a significant challenge for maintaining security while leveraging community resources.
Infosecurity Magazine
The newly identified vulnerability known as 'HashJack' poses a significant threat by allowing attackers to compromise websites that interact with AI browsers. This could lead to malicious exploitation, affecting user security and trust in web applications.
Researchers have developed a low-cost device that successfully bypasses the memory encryption protections implemented by AMD and Intel, exposing significant vulnerabilities in scalable memory encryption systems. This discovery raises serious concerns regarding the integrity and confidentiality of data processed by these chipmakers' technologies.
The article highlights five vulnerabilities in the open-source tool Fluent Bit, which could lead to severe security issues such as path traversal attacks, remote code execution, denial-of-service, and tag manipulation. These flaws pose a significant risk to cloud services, potentially allowing attackers to take control of affected systems.
The 'JackFix' attack represents a new variant of ClickFix, significantly increasing psychological pressure on targets while overcoming some of the existing technical mitigations against traditional ClickFix attacks. This escalation highlights the evolving nature of cybersecurity threats and the need for continuous adaptation in defense strategies.
The Festo Compact Vision System and related products have critical vulnerabilities that could allow unauthorized access and modification of configuration files, with a CVSS score of up to 9.8. Users are urged to implement security measures to mitigate the risk of exploitation, as these vulnerabilities could severely impact device security and integrity.
All CISA Advisories
The article discusses a vulnerability in Opto 22's groov View that allows for the exposure of sensitive information through metadata, potentially leading to credential and key exposure as well as privilege escalation. This vulnerability, assigned CVE-2025-13084, has a CVSS v4 score of 6.1 and affects multiple versions of groov View, necessitating immediate remediation to mitigate risks.