![Log4j](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/15084105/log4j-hns-bw-400x200.jpg)
Log4Shell: A new fix, details of active attacks, and risk mitigation recommendations
Due to the extraordinary widespread use of the open-source Apache Log4j library, the saga of the Log4Shell (CVE-2021-44228) vulnerability is nowhere near finished. As Dr. …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100728/tunnel-400x200.jpg)
Determined APT is exploiting ManageEngine ServiceDesk Plus vulnerability (CVE-2021-44077)
An APT group is leveraging a critical vulnerability (CVE-2021-44077) in Zoho ManageEngine ServiceDesk Plus to compromise organizations in a variety of sectors, including …
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100610/windows-400x200.jpg)
After failed fix, researcher releases exploit for Windows EoP flaw (CVE-2021-41379)
A local elevation of privilege vulnerability (CVE-2021-41379) in the Windows Installer that Microsoft supposedly fixed on November 2021 Patch Tuesday is, according to its …
![target](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113330/target-400x200.jpg)
List of IT assets an attacker is most likely to target for exploitation
Randori released a report that identifies the most tempting IT assets that an attacker is likely to target and exploit. Leading up to the anniversary of the Solarwinds hack, …
![Nagios](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/23110819/nagios-logo-hns-400x200.jpg)
Nagios XI vulnerabilities open enterprise IT infrastructure to attack
Researchers have unearthed 11 vulnerabilities affecting Nagios XI, a widely used enterprise IT infrastructure/network monitoring solution, some of which can be chained to …
![microsoft power apps](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/17163815/microsot-power-apps-hns1-400x200.jpg)
Microsoft Power Apps data exposure: Prioritizing sensitive data with secure configuration settings
Security misconfigurations are one of the most common gaps hackers look to exploit. One bad configuration setting in a popular cloud platform can have far-reaching …
![CVE-2021-40444 exploitation](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/16164004/cve-2021-40444_exploitation-hns-400x200.jpg)
CVE-2021-40444 exploitation: Researchers find connections to previous attacks
The recent targeted attacks exploiting the (at the time) zero-day remote code execution vulnerability (CVE-2021-40444) in Windows via booby-trapped Office documents have been …
![Patch Tuesday](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/14193530/patch_tuesday-400x200.jpg)
Microsoft patches actively exploited MSHTML zero-day RCE (CVE-2021-40444)
On September 2021 Patch Tuesday, Microsoft has fixed 66 CVE-numbered vulnerabilities in a wide variety of its solutions. Of these, the most crucial to address is …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113415/apple-1-400x200.jpg)
Apple fixes “zero-click” iMessage zero-day exploited to deliver spyware (CVE-2021-30860)
Apple has released security updates for macOS, iOS, iPadOS, watchOS and Safari that patch two vulnerabilities (CVE-2021-30860, CVE-2021-30858) that are being exploited in …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/01102838/cisco-pattern-logo-400x200.jpg)
Patched: Critical bug with public PoC exploit in Cisco infrastructure virtualization software (CVE-2021-34746)
A critical vulnerability (CVE-2021-34746) that affects Cisco Enterprise NFV Infrastructure Software (NFVIS) has been patched and Cisco is urging enterprise admins to quickly …
![Realtek](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/16122316/realtek-082021-400x200.jpg)
Realtek SDK vulnerability exploitation attempts detected (CVE-2021-35395)
Threat actors are attempting to exploit CVE-2021-35395, a group of vulnerabilities in the web interface of the Realtek SDK, to spread Mirai malware to vulnerable IoT devices. …
![Microsoft Exchange](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/23115505/microsoft_exchange-ice-hns-400x200.jpg)
ProxyShell vulnerabilities actively exploited to deliver web shells and ransomware
Three so-called “ProxyShell” vulnerabilities are being actively exploited by various attackers to compromise Microsoft Exchange servers around the world, the …
Featured news
Resources
Don't miss
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations
- How to customize Safari for private browsing on iOS
- Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
- Swap EOL Zyxel routers, upgrade Netgear ones!