Cyble Calls for Solutions to Address Dark Web Activity Involving NVIDIA, Adobe, CUPS, and Notes

Published:

spot_img

Cyble Researchers Flag 8 High-Priority Vulnerabilities and Dark Web Exploits

Cyble researchers have been hard at work uncovering vulnerabilities in various IT systems, with a total of 19 vulnerabilities investigated in the week ending Oct.1. Among these vulnerabilities, eight were flagged as high priority, including some concerning exploits being discussed on dark web and cybercrime forums.

One notable vulnerability highlighted in Cyble’s weekly report is an OpenSSH vulnerability with 8 million exposures, as well as claimed zero days in Apple and Android systems. Threat actors were also seen discussing vulnerabilities in SolarWinds, Microsoft, Zimbra, WordPress, and Fortinet on underground forums.

The report from Cyble Research & Intelligence Labs (CRIL) identified four products with critical vulnerabilities that security teams should prioritize. These include vulnerabilities in Optigo’s ONS-S8 Spectra Aggregation Switch, NVIDIA Container Toolkit, Adobe Commerce, and Linux CUPS.

Cyble researchers also noted 10 exploits being discussed in Telegram channels and cybercrime forums, urging security teams to pay closer attention to these issues. These exploits include critical vulnerabilities in SolarWinds Web Help Desk, Microsoft Office, Apple operating systems, WordPress plugins, Zimbra Collaboration Suite, and more.

Overall, the findings from Cyble’s research highlight the ongoing threat landscape faced by organizations and the importance of staying vigilant against cyber threats. Security teams are advised to patch these vulnerabilities promptly to protect their systems from potential attacks.

spot_img

Related articles

Recent articles

MBRGI Launches AED 5.5 Million Initiative to Combat Malnutrition in Three African Nations

Tackling Malnutrition: MBRGI's Impact in Africa An Overview of the 1 Billion Meals Campaign In a strategic move to combat malnutrition, the Mohammed bin Rashid Al...

Tackling Growing Security Threats: A Practical Guide

Navigating Machine Identity Management: A Growing Imperative The landscape of identity management has evolved significantly, particularly when differentiating between human and non-human identities, or machine...

Navigating the N.S. Power Security Breach: How Hackers Exploit Stolen Data

Exploring the Dark Side: The Nova Scotia Power Data Breach The Data Breach Overview In an alarming incident affecting 280,000 customers, Nova Scotia Power recently experienced...

Major Distributor Hack Leaves Whole Foods Shelves Empty

Whole Foods Experiences Supply Chain Disruption Due to Cyber Attack A recent cyber attack on a prominent U.S. food distributor has left shelves at Whole...