1010.cx

  • Namespace Reuse Vulnerability Exposes AI Platforms to Remote Code Execution

    9/3/2025

    ·

    AI, cyber security, Cyber Security News, Namespace, vulnerability

    A newly discovered vulnerability in the AI supply chain—termed Model Namespace Reuse—permits attackers to achieve Remote Code Execution (RCE) across major AI platforms, including Microsoft Azure AI Foundry, Google Vertex AI, and thousands of open-source projects. By re-registering abandoned or deleted model namespaces on Hugging Face, malicious actors can trick pipelines that fetch models by […]

    The post Namespace Reuse Vulnerability Exposes AI Platforms to Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CISA Alerts on TP-Link Authentication Flaw Under Active Exploitation

    9/3/2025

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert about a serious security hole in certain TP-Link devices. This flaw, tracked as CVE-2020-24363, allows an attacker on the same network to take control without needing a password. CISA warns that this weakness is already being actively exploited by bad actors. Vulnerability Details […]

    The post CISA Alerts on TP-Link Authentication Flaw Under Active Exploitation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • PagerDuty Confirms Data Breach After Third-Party App Vulnerability Exposes Salesforce Data

    9/3/2025

    ·

    cyber security, Cyber Security News, Data Breach

    PagerDuty, a leader in digital operations management, has confirmed a security incident that resulted in unauthorized access to some of its data stored in Salesforce.

    The company stated that no PagerDuty platform credentials were compromised and that the breach resulted from a vulnerability in a third-party application, Salesloft Drift.

    The incident’s timeline began on August 20, 2025, when PagerDuty was first notified by Salesloft about a potential security issue related to its Drift application.

    Three days later, on August 23rd, Salesloft confirmed that attackers had exploited a vulnerability in Drift’s OAuth integration with Salesforce. This “hijacked authorization process” allowed a threat actor to gain unauthorized access to PagerDuty’s Salesforce instance.

    PagerDuty Confirms Data Breach

    PagerDuty has emphasized that the breach was limited in scope. In a statement, the company confirmed, “We have not seen any indication that access to the PagerDuty platform or any other internal systems or resources beyond Salesforce may have occurred.”

    The company immediately disabled Salesloft Drift’s access to its Salesforce data upon learning of the compromise and is conducting an ongoing investigation.

    The data potentially exposed includes customer contact information such as names, phone numbers, and email addresses. While PagerDuty’s core services and credentials remain secure, the exposure of this contact information raises the risk of targeted phishing and social engineering attacks against its customers.

    In light of this potential exposure, PagerDuty is advising all customers to exercise extra vigilance. “PagerDuty will never contact anyone by phone to request a password or any other secure details,” the company warned. “All official communication from PagerDuty comes through our trusted support channels.”

    This security event is part of a wider issue affecting customers of the Salesloft Drift application. Background information and technical details on the vulnerability have been published by Salesloft on its trust center, as well as by Salesforce and Google’s Threat Intelligence Group, which has been tracking the activity.

    The incident highlights the complex security challenges companies face when integrating third-party applications into their core systems.

    On August 27th, Salesloft issued further recommendations for Drift customers who manage their own connections to third-party applications, signaling the ongoing efforts to contain the vulnerability’s impact across the industry.

    PagerDuty has assured its customers that it is treating the matter with the utmost seriousness and is working diligently to understand the full scope of the incident.

    The company continues to monitor the situation closely and is committed to providing updates as its investigation progresses. Customers are urged to be cautious of unsolicited communications and to report any suspicious activity.

    Confirmed victims of this supply chain attack include:

    • Palo Alto Networks: The cybersecurity firm confirmed the exposure of business contact information and internal sales data from its CRM platform.
    • Zscaler: The cloud security company reported that customer information, including names, contact details, and some support case content, was accessed.
    • Google: In addition to being an investigator, Google confirmed a “very small number” of its Workspace accounts were accessed through the compromised tokens.
    • Cloudflare: Cloudflare has confirmed a data breach where a sophisticated threat actor accessed and stole customer data from the company’s Salesforce instance.

    Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.

    The post PagerDuty Confirms Data Breach After Third-Party App Vulnerability Exposes Salesforce Data appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Over 1,100 Ollama AI Servers Found Online, 20% at Risk

    9/3/2025

    ·

    AI, cyber security, Cyber Security News, Ollama

    More than 1,100 instances of Ollama—a popular framework for running large language models (LLMs) locally—were discovered directly accessible on the public internet, with approximately 20% actively hosting vulnerable models that could be exploited by unauthorized parties. Cisco Talos specialists made the alarming finding during a rapid Shodan scan, underscoring negligent security practices in AI deployments […]

    The post Over 1,100 Ollama AI Servers Found Online, 20% at Risk appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure

    9/3/2025

    ·

    Threat actors are attempting to leverage a newly released artificial intelligence (AI) offensive security tool called HexStrike AI to exploit recently disclosed security flaws. HexStrike AI, according to its website, is pitched as an AI‑driven security platform to automate reconnaissance and vulnerability discovery with an aim to accelerate authorized red teaming operations, bug bounty hunting,

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Dire Wolf Ransomware Targets Windows, Wipes Logs and Backups

    9/3/2025

    ·

    cyber security, Cyber Security News, Ransomware, Windows

    The recently emerged DireWolf ransomware group has launched a sophisticated new campaign targeting Windows systems worldwide, employing ruthless tactics to delete event logs, erase backup-related data, and thwart recovery efforts. First sighted in May 2025, DireWolf has rapidly escalated its operations, infecting 16 organizations across 16 regions—including the United States, Thailand, Taiwan, Australia, and Italy—and […]

    The post Dire Wolf Ransomware Targets Windows, Wipes Logs and Backups appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Apache DolphinScheduler Vulnerability Patched — Update Immediately

    9/3/2025

    ·

    Apache, cyber security, Cyber Security News, vulnerability

    A low-severity security issue in Apache DolphinScheduler has been addressed in the latest release. Identified as CVE-2024-43166 and classified under CWE-276: Incorrect Default Permissions, this vulnerability affects all DolphinScheduler versions prior to 3.2.2. Users are strongly advised to upgrade to version 3.3.1 as soon as possible to mitigate potential risks. Apache DolphinScheduler is an open-source, […]

    The post Apache DolphinScheduler Vulnerability Patched — Update Immediately appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Detecting Data Leaks Before Disaster

    9/3/2025

    ·

    In January 2025, cybersecurity experts at Wiz Research found that Chinese AI specialist DeepSeek had suffered a data leak, putting more than 1 million sensitive log streams at risk. According to the Wiz Research team, they identified a publicly accessible ClickHouse database belonging to DeepSeek. This allowed “full control over database operations, including the ability to access

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google Avoids Chrome Breakup but Must Share Search Data With Competitors

    9/3/2025

    ·

    Chrome, cyber security, Cyber Security News, Google

    The U.S. District Court for the District of Columbia today imposed landmark remedies in the Justice Department’s monopolization case against Google, ordering the tech giant to share critical search data with competitors and outlawing exclusive distribution agreements for its flagship products. The ruling stops short of forcing Google to divest its Chrome browser but mandates […]

    The post Google Avoids Chrome Breakup but Must Share Search Data With Competitors appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • NVIDIA Patches Vulnerabilities Causing DoS, EoP, and Data Exposure

    9/3/2025

    ·

    CVE/vulnerability, cyber security, Cyber Security News, Vulnerabilities, vulnerability

    NVIDIA today released critical security updates for its BlueField, ConnectX, DOCA, Mellanox DPDK, Cumulus Linux, and NVOS products. The Partner Security Bulletin addresses multiple vulnerabilities that could allow denial of service (DoS), escalation of privileges (EoP), and information disclosure. Customers are urged to download and install updated components immediately to protect their systems. To get […]

    The post NVIDIA Patches Vulnerabilities Causing DoS, EoP, and Data Exposure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 40 41 42 43 44 … 110
Next Page

1010.cx

cybersecurity / defense / intelligence