Cyber Accord
  • Home
  • Services
    • Security Testing
    • CLOUD SECURITY
    • GAP ASSESSMENTS
    • Compliance Readiness
    • Advisory
    • Questionnaires
  • About us
  • Contact
  • Our Blogs
Select Page
“Over 10,000 Fortinet Firewalls at Risk from Long-Standing MFA Bypass Vulnerability”

“Over 10,000 Fortinet Firewalls at Risk from Long-Standing MFA Bypass Vulnerability”

Cyber Security

“`html More than 10,000 Fortinet firewalls globally remain exposed to CVE-2020-12812, a vulnerability allowing bypass of multi-factor authentication (MFA) identified over five and a half years ago. Recently, Shadowserver incorporated the issue into its daily...
“2025’s Most Exploited High-Risk Vulnerabilities: The Top 10 Threats to Watch Out For”

“2025’s Most Exploited High-Risk Vulnerabilities: The Top 10 Threats to Watch Out For”

Cyber Security

“`html The cybersecurity environment in 2025 has experienced an extraordinary increase in significant vulnerabilities, with more than 21,500 CVEs revealed in merely the first six months of the year, indicating a 16-18% rise when compared to 2024. Among these, a...
“Self-Replicating GlassWorm: Exploiting VS Code Extensions to Target macOS Users”

“Self-Replicating GlassWorm: Exploiting VS Code Extensions to Target macOS Users”

Cyber Security

“`html A fresh onset of GlassWorm malware has surfaced, representing a notable change in targeting approach from Windows to macOS platforms. This self-replicating worm, disseminated via harmful VS Code extensions on the Open VSX marketplace, has already amassed...
“Major Magecart Attack: Over 50 Malicious Scripts Targeting Checkout and Account Creation Processes”

“Major Magecart Attack: Over 50 Malicious Scripts Targeting Checkout and Account Creation Processes”

Cyber Security

“`html A vast-scale web skimming scheme has surfaced throughout the internet, targeting online consumers and account holders with unparalleled reach. Security analysts have detected an extensive global initiative with over 50 scripts that seize sensitive data...
“Silver Fox Cybercriminals Target Indian Organizations with Income Tax Phishing Scams”

“Silver Fox Cybercriminals Target Indian Organizations with Income Tax Phishing Scams”

Cyber Security

“`html Chinese cyber adversaries known as Silver Fox are targeting Indian institutions via advanced phishing operations that mimic genuine income tax documents. This attack campaign leverages authentic-looking emails from the Income Tax Department to deceive...
“Data Security Alert: WIRED Database Breached, Exposing 2.3 Million Subscriber Records”

“Data Security Alert: WIRED Database Breached, Exposing 2.3 Million Subscriber Records”

Cyber Security

“`html Cybercriminals have disclosed a database comprising over 2.3 million WIRED subscriber records, signaling a significant violation at Condé Nast, the parent organization. The malicious entity “Lovely” asserts this is merely the beginning, vowing to unveil...
“Over 87,000 MongoDB Instances at Risk Due to MongoBleed Security Vulnerability”

“Over 87,000 MongoDB Instances at Risk Due to MongoBleed Security Vulnerability”

Cyber Security

“`html A critical-severity flaw in MongoDB Server that enables unauthorized remote attackers to extract sensitive information from database memory. Named “MongoBleed” due to its automated similarities with the notorious Heartbleed vulnerability, the defect is...
“Critical M-Files Security Flaw Allows Session Token Hijacking of Active Users”

“Critical M-Files Security Flaw Allows Session Token Hijacking of Active Users”

Cyber Security

“`html A vulnerability concerning information leakage in M-Files Server allows verified attackers to intercept and reuse session tokens belonging to active users, potentially granting unauthorized entry to sensitive document management systems. This defect,...
“Serious Langchain Flaw Allows Unauthorized Access to Sensitive AI Data”

“Serious Langchain Flaw Allows Unauthorized Access to Sensitive AI Data”

Cyber Security

“`html A significant vulnerability in LangChain’s fundamental library (CVE-2025-68664) permits malicious actors to extract confidential environment variables and potentially execute code via deserialization vulnerabilities. Identified by a researcher from Cyata...
Microsoft Introduces Hardware-Accelerated BitLocker for Improved Security and Performance

Microsoft Introduces Hardware-Accelerated BitLocker for Improved Security and Performance

Cyber Security

“`html Microsoft has revealed hardware-accelerated BitLocker, a notable security upgrade aimed at eliminating performance restrictions caused by encryption on contemporary high-speed NVMe drives. This innovative technology tackles the increasing worries...
« Older Entries
Next Entries »

Recent Posts

  • ZAP Unveils OWASP PenTest Kit: A Browser Extension for Enhanced Application Security Testing
  • Exploit in the Wild: Cisco Unified Communications 0-Day RCE Vulnerability Grants Root Access
  • Sprocket Security Welcomes Eric Sheridan as New CTO
  • “Exploiting Google Gemini: How Calendar Invites Can Compromise Meeting Privacy”
  • “Microsoft’s January 2026 Security Update Leads to Remote Desktop Credential Prompt Issues”

Categories

  • Cyber Security
CyberAccord | All Rights Reserved | 2025