Cyble Calls for Solutions to Address Dark Web Activity Involving NVIDIA, Adobe, CUPS, and Notes

Published:

spot_img

Cyble Researchers Flag 8 High-Priority Vulnerabilities and Dark Web Exploits

Cyble researchers have been hard at work uncovering vulnerabilities in various IT systems, with a total of 19 vulnerabilities investigated in the week ending Oct.1. Among these vulnerabilities, eight were flagged as high priority, including some concerning exploits being discussed on dark web and cybercrime forums.

One notable vulnerability highlighted in Cyble’s weekly report is an OpenSSH vulnerability with 8 million exposures, as well as claimed zero days in Apple and Android systems. Threat actors were also seen discussing vulnerabilities in SolarWinds, Microsoft, Zimbra, WordPress, and Fortinet on underground forums.

The report from Cyble Research & Intelligence Labs (CRIL) identified four products with critical vulnerabilities that security teams should prioritize. These include vulnerabilities in Optigo’s ONS-S8 Spectra Aggregation Switch, NVIDIA Container Toolkit, Adobe Commerce, and Linux CUPS.

Cyble researchers also noted 10 exploits being discussed in Telegram channels and cybercrime forums, urging security teams to pay closer attention to these issues. These exploits include critical vulnerabilities in SolarWinds Web Help Desk, Microsoft Office, Apple operating systems, WordPress plugins, Zimbra Collaboration Suite, and more.

Overall, the findings from Cyble’s research highlight the ongoing threat landscape faced by organizations and the importance of staying vigilant against cyber threats. Security teams are advised to patch these vulnerabilities promptly to protect their systems from potential attacks.

spot_img

Related articles

Recent articles

U.S. Government Launches National Security Evaluations for Frontier AI Models Before Public Release

U.S. Government Launches National Security Evaluations for Frontier AI Models Before Public Release In a significant move, the U.S. government has unveiled two sets of...

Physical Security Systems Become Cyber Risks as IT and Security Teams Remain Disconnected

Physical Security Systems Become Cyber Risks as IT and Security Teams Remain Disconnected For many years, physical security systems operated independently from IT departments. Video...

UAE Accelerates AI Adoption, Rethinking Cybersecurity Models for Trust and Integrity

UAE Accelerates AI Adoption, Rethinking Cybersecurity Models for Trust and Integrity Artificial intelligence (AI) is no longer merely an adjunct to digital transformation; it is...

Delhi Police Busts NEET Admission Scam, Rescues 18 Students and Arrests Four in Major Operation

Delhi Police Busts NEET Admission Scam, Rescues 18 Students and Arrests Four in Major Operation In a significant operation targeting exam-related fraud, the Delhi Police...