<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Fri, 22 May 2026 04:35:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Microsoft Defender Zero-Day Discovered</title>
		<link>https://firsthackersnews.com/microsoft-defender-zero-day-exploited/</link>
					<comments>https://firsthackersnews.com/microsoft-defender-zero-day-exploited/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 22 May 2026 04:34:46 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<category><![CDATA[#cve202641091]]></category>
		<category><![CDATA[#cve202645498]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#defendersecurity]]></category>
		<category><![CDATA[#DigitalRisk]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#Hacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#ITSecurity]]></category>
		<category><![CDATA[#microsoftdefender]]></category>
		<category><![CDATA[#MicrosoftSecurity]]></category>
		<category><![CDATA[#PrivilegeEscalation]]></category>
		<category><![CDATA[#ransomware]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#SecurityVulnerability]]></category>
		<category><![CDATA[#ThreatHunting]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#WindowsSecurity]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<category><![CDATA[#ZeroDayVulnerability]]></category>
		<category><![CDATA[#ZeroTrust]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11735</guid>

					<description><![CDATA[<p>Microsoft Defender zero-day vulnerabilities tracked as CVE-2026-41091 and CVE-2026-45498 are actively being exploited in real-world attacks. The flaws</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-defender-zero-day-exploited/">Microsoft Defender Zero-Day Discovered</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft Defender zero-day vulnerabilities tracked as CVE-2026-41091 and CVE-2026-45498 are actively being exploited in real-world attacks. The flaws could allow privilege escalation and denial-of-service attacks on affected systems.</p>



<p>Security researchers warn that the vulnerabilities could allow attackers to escalate privileges, disrupt systems, and strengthen post-exploitation attacks inside compromised environments.</p>



<h2 class="wp-block-heading"><strong>Privilege Escalation Flaw in Microsoft Defender</strong></h2>



<p>The most critical vulnerability, CVE-2026-41091, is an elevation of privilege flaw with a CVSS score of 7.8. The issue is caused by improper link resolution before file access, a weakness categorized under CWE-59.</p>



<p>According to Microsoft, attackers with limited access to a system can exploit the flaw locally to gain higher privileges without requiring user interaction. Because the vulnerability has low attack complexity, it becomes especially dangerous once threat actors gain initial access through phishing, malware infections, or another compromised application.</p>



<p>Successful exploitation could allow attackers to:</p>



<ul class="wp-block-list">
<li>Gain elevated system privileges</li>



<li>Access sensitive information</li>



<li>Modify security settings or disable protections</li>
</ul>



<p>Microsoft confirmed that exploitation activity has already been detected in the wild, making rapid patching critical for affected environments.</p>



<h2 class="wp-block-heading"><strong>Denial-of-Service Vulnerability and Security Risks</strong></h2>



<p>The second flaw, CVE-2026-45498, is a denial-of-service vulnerability with a lower CVSS score of 4.0. Despite its lower severity rating, Microsoft also confirmed active exploitation attempts targeting this issue.</p>



<p>The vulnerability can cause systems running Microsoft Defender to become unstable or unresponsive. Although it does not directly impact confidentiality or integrity, disrupting endpoint security services can weaken defensive visibility and create opportunities for additional attacks.</p>



<p>Researchers noted that both vulnerabilities share several high-risk characteristics:</p>



<ul class="wp-block-list">
<li>No user interaction required</li>



<li>Low attack complexity</li>



<li>Active exploitation already observed</li>
</ul>



<p>Security experts believe the privilege escalation flaw could be used as part of larger attack chains in ransomware operations or advanced persistent threat (APT) campaigns. Attackers commonly use these techniques after gaining initial access to move deeper into enterprise environments and maintain persistence.</p>



<p>Microsoft has released security updates addressing both vulnerabilities, and organizations are strongly advised to deploy patches immediately. Security teams should also monitor endpoint logs, investigate suspicious privilege escalation activity, and strengthen endpoint detection and response capabilities.</p>



<p>The disclosure highlights an ongoing cybersecurity challenge where even widely trusted security products can themselves become targets for advanced attackers.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-defender-zero-day-exploited/">Microsoft Defender Zero-Day Discovered</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/microsoft-defender-zero-day-exploited/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apache OFBiz Vulnerability Enables Authentication Bypass</title>
		<link>https://firsthackersnews.com/apache-ofbiz-vulnerability-authentication-bypass/</link>
					<comments>https://firsthackersnews.com/apache-ofbiz-vulnerability-authentication-bypass/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 21 May 2026 22:43:31 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#apacheofbiz]]></category>
		<category><![CDATA[#apacheofbizvulnerability]]></category>
		<category><![CDATA[#apachevulnerability]]></category>
		<category><![CDATA[#ApplicationSecurity]]></category>
		<category><![CDATA[#AuthenticationBypass]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DigitalRisk]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#erpsecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#groovy]]></category>
		<category><![CDATA[#Hacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#ITSecurity]]></category>
		<category><![CDATA[#RCE]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ServerSecurity]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<category><![CDATA[#WebSecurity]]></category>
		<category><![CDATA[#ZeroTrust]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11731</guid>

					<description><![CDATA[<p>An Apache OFBiz vulnerability tracked as CVE-2026-45434 could allow attackers to bypass authentication protections and execute malicious code</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apache-ofbiz-vulnerability-authentication-bypass/">Apache OFBiz Vulnerability Enables Authentication Bypass</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>An Apache OFBiz vulnerability tracked as CVE-2026-45434 could allow attackers to bypass authentication protections and execute malicious code on vulnerable servers through a crafted HTTP request. The flaw, tracked as CVE-2026-45434, affects all Apache OFBiz versions before 24.09.06 and carries a high CVSS score of 8.8.</p>



<p>Apache OFBiz is a widely used open-source ERP platform used to manage enterprise business operations and workflows. Researchers from Aretiq AI discovered that attackers could abuse the platform’s password-change mechanism to gain unauthorized access and execute malicious code on vulnerable servers.</p>



<h2 class="wp-block-heading">Authentication Bypass Through Password Reset Logic</h2>



<p>The issue originates from the way Apache OFBiz handles forced password-change workflows. Normally, accounts marked with <code>requirePasswordChange=Y</code> should remain restricted until the password reset process is completed.</p>



<p>However, researchers found that the <code>LoginWorker.checkLogin()</code> method incorrectly treats the <code>requirePasswordChange</code> response as a successful login instead of an authentication failure.</p>



<p>The vulnerability becomes more dangerous because the <code>requirePasswordChange</code> value is read directly from user-controlled HTTP request parameters rather than securely validated against database records.</p>



<p>By abusing this behavior, attackers can:</p>



<ul class="wp-block-list">
<li>Inject password-change parameters into a crafted HTTP request</li>



<li>Create an authenticated session without completing a proper login process</li>
</ul>



<p>Researchers also warned that many OFBiz deployments still contain default demo accounts such as <code>admin</code>, <code>flexadmin</code>, and <code>demoadmin</code>, often configured with default credentials like <code>ofbiz</code>.</p>



<h2 class="wp-block-heading">Remote Code Execution and Security Fixes</h2>



<p>The authentication bypass can be chained with another vulnerability affecting <code>ProgramExport.groovy</code>. In vulnerable versions, the component allows execution of user-supplied Groovy code without proper sandboxing or permission checks.</p>



<p>This allows attackers to execute arbitrary system commands directly on the server. Researchers successfully demonstrated remote code execution on OFBiz 24.09.05 using a single crafted POST request targeting <code>/webtools/control/ProgramExport</code>.</p>



<p>Successful exploitation could allow attackers to:</p>



<ul class="wp-block-list">
<li>Execute malicious commands on the server</li>



<li>Deploy malware or backdoors</li>
</ul>



<p>Apache fixed the issue in version 24.09.06 by removing unsafe password-change handling, adding stricter permission checks, and introducing a secure Groovy sandbox to block dangerous command execution patterns.</p>



<p>Organizations are strongly advised to upgrade immediately, remove default demo accounts, change weak credentials, and restrict access to sensitive OFBiz administrative endpoints.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apache-ofbiz-vulnerability-authentication-bypass/">Apache OFBiz Vulnerability Enables Authentication Bypass</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/apache-ofbiz-vulnerability-authentication-bypass/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ExifTool Flaw Allows Mac System Compromise</title>
		<link>https://firsthackersnews.com/exiftool-vulnerability-mac-compromise/</link>
					<comments>https://firsthackersnews.com/exiftool-vulnerability-mac-compromise/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 20 May 2026 01:30:00 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[MacOS]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#AppleSecurity]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CommandInjection]]></category>
		<category><![CDATA[#cve20263102]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DigitalRisk]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#exiftool]]></category>
		<category><![CDATA[#exiftoolvulnerability]]></category>
		<category><![CDATA[#Hacking]]></category>
		<category><![CDATA[#imageprocessing]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#ITSecurity]]></category>
		<category><![CDATA[#macOS]]></category>
		<category><![CDATA[#macOSSecurity]]></category>
		<category><![CDATA[#MacSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#metadatasecurity]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<category><![CDATA[#ZeroTrust]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11727</guid>

					<description><![CDATA[<p>A newly discovered vulnerability in ExifTool could allow attackers to execute malicious commands on macOS systems through specially</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/exiftool-vulnerability-mac-compromise/">ExifTool Flaw Allows Mac System Compromise</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly discovered vulnerability in ExifTool could allow attackers to execute malicious commands on macOS systems through specially crafted image files. The ExifTool vulnerability, tracked as CVE-2026-3102, affects ExifTool versions 13.49 and earlier and raises serious concerns for organizations that process large volumes of media files.</p>



<p>ExifTool is widely used to read and modify metadata in images, PDFs, and multimedia files. Because the tool is heavily integrated into media workflows, automation pipelines, and digital asset management systems, the vulnerability creates a significant security risk in environments that handle untrusted files.</p>



<p>The implications of the ExifTool vulnerability extend to various sectors, where data integrity and security are paramount.</p>



<h2 class="wp-block-heading"><strong>How the Vulnerability Works</strong></h2>



<p>The issue is linked to improper sanitization of metadata fields related to file creation dates on macOS. Researchers found that attackers can embed malicious commands inside image metadata fields such as FileCreateDate or DateTimeOriginal.</p>



<p>When ExifTool processes the manipulated file under specific conditions, the hidden command can be executed through the system shell.</p>



<p>The vulnerability becomes exploitable when:</p>



<ul class="wp-block-list">
<li>ExifTool processes raw metadata values using the <code>-n</code> flag</li>



<li>Malicious metadata is copied through the <code>-tagsFromFile</code> feature</li>



<li>Unsafe input reaches a system() execution call without proper filtering</li>
</ul>



<p>Researchers observed that ExifTool internally builds system commands using metadata values extracted directly from files. While most parameters are sanitized, one execution path allowed unfiltered user-controlled data to be passed into a shell command.</p>



<p>This creates a command injection scenario where attackers can run arbitrary commands with the privileges of the user processing the file.</p>



<h2 class="wp-block-heading"><strong>Security Risks and Patch Information</strong></h2>



<p>The vulnerability is especially dangerous for organizations using automated image-processing workflows, newsroom environments, or media management platforms where files are processed automatically.</p>



<p>Because the malicious payload is hidden inside metadata, the image itself may appear legitimate and bypass traditional security checks.</p>



<p>If exploited successfully, attackers could:</p>



<ul class="wp-block-list">
<li>Execute malicious commands on macOS systems</li>



<li>Deploy malware or backdoors</li>



<li>Steal sensitive information</li>



<li>Move laterally across internal networks</li>
</ul>



<p>Researchers from Kaspersky identified the vulnerability, and ExifTool developers addressed the issue in version 13.50.</p>



<p>The patched release changes how system commands are executed by replacing unsafe string-based command construction with safer argument-based execution methods. This prevents shell interpretation and significantly reduces the risk of command injection.</p>



<p>Users and organizations are strongly advised to update to ExifTool 13.50 or later immediately. Security experts also recommend processing untrusted files inside isolated environments such as sandboxes or virtual machines to reduce exposure to malicious media files.</p>



<p>The incident highlights an ongoing cybersecurity challenge where even trusted file-processing tools can become attack vectors if user-controlled input is not handled securely.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/exiftool-vulnerability-mac-compromise/">ExifTool Flaw Allows Mac System Compromise</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/exiftool-vulnerability-mac-compromise/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>VoidStealer Steals Chrome Browser Data</title>
		<link>https://firsthackersnews.com/voidstealer-malware-chrome-data/</link>
					<comments>https://firsthackersnews.com/voidstealer-malware-chrome-data/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 19 May 2026 21:02:23 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11722</guid>

					<description><![CDATA[<p>A newly discovered infostealer known as VoidStealer is drawing attention from security researchers after demonstrating the ability to</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/voidstealer-malware-chrome-data/">VoidStealer Steals Chrome Browser Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly discovered infostealer known as VoidStealer is drawing attention from security researchers after demonstrating the ability to bypass browser protections designed to secure sensitive Chrome data. The malware targets Google Chrome’s App-Bound Encryption (ABE), a security feature introduced to better protect stored credentials and session cookies.</p>



<p>Researchers found that VoidStealer can extract encryption keys directly from browser memory, allowing attackers to steal active sessions and access accounts even on fully updated systems.</p>



<h3 class="wp-block-heading">How VoidStealer Bypasses Chrome Protections</h3>



<p>Google introduced App-Bound Encryption in Chrome 127 to strengthen protection around sensitive browser data such as cookies, passwords, and session tokens. The feature was designed to prevent malware running with normal user privileges from accessing Chrome’s encryption keys.</p>



<figure class="wp-block-image size-large is-resized"><img fetchpriority="high" decoding="async" width="1024" height="665" src="https://firsthackersnews.com/wp-content/uploads/2026/05/image-2-1024x665.png" alt="" class="wp-image-11723" style="aspect-ratio:1.5408511960236098;width:841px;height:auto" srcset="https://firsthackersnews.com/wp-content/uploads/2026/05/image-2-300x195.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/05/image-2-768x498.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/05/image-2-1024x665.png 1024w, https://firsthackersnews.com/wp-content/uploads/2026/05/image-2.png 1416w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Unlike older protection methods based on DPAPI, ABE binds encryption keys directly to the Chrome application. A dedicated system process validates that only Chrome can request access to those keys.</p>



<p>However, VoidStealer avoids interacting with Chrome through official APIs. Instead, it targets the moment when Chrome decrypts sensitive data in memory.</p>



<p>Researchers observed that the malware:</p>



<ul class="wp-block-list">
<li>Attaches itself to the Chrome process as a debugger</li>



<li>Monitors the browser’s decryption workflow</li>



<li>Pauses execution when encryption keys are loaded into memory</li>



<li>Extracts the decrypted keys directly from RAM</li>
</ul>



<p>Because the attack focuses on runtime behavior rather than stored files, it bypasses many of the protections implemented by App-Bound Encryption.</p>



<h3 class="wp-block-heading">Impact on Chromium Browsers and Security Risks</h3>



<p>Once attackers obtain the decrypted session data, they can hijack active sessions without needing usernames or passwords. This allows threat actors to access accounts as if they were the legitimate user.</p>



<p>The malware affects multiple Chromium-based browsers, including:</p>



<ul class="wp-block-list">
<li>Google Chrome</li>



<li>Microsoft Edge</li>



<li>Brave</li>



<li>Opera</li>



<li>Vivaldi</li>
</ul>



<p>Researchers also noted that VoidStealer is being distributed through a malware-as-a-service model, allowing cybercriminals to rent the malware and scale attacks more easily.</p>



<p>The discovery highlights an ongoing challenge in browser security. Even with stronger encryption mechanisms, attackers continue to focus on runtime memory access, where sensitive data must temporarily exist in decrypted form during legitimate browser operations.</p>



<p>To reduce exposure, security experts recommend avoiding untrusted software downloads, keeping browsers fully updated, using strong endpoint protection, and storing credentials in dedicated password managers instead of directly in browsers.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/voidstealer-malware-chrome-data/">VoidStealer Steals Chrome Browser Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/voidstealer-malware-chrome-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NGINX Vulnerability Enables Remote Code Execution</title>
		<link>https://firsthackersnews.com/nginx-vulnerability-rce/</link>
					<comments>https://firsthackersnews.com/nginx-vulnerability-rce/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 18 May 2026 18:27:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#DigitalRisk]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#Hacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#ITSecurity]]></category>
		<category><![CDATA[#LinuxSecurity]]></category>
		<category><![CDATA[#nginx]]></category>
		<category><![CDATA[#nginxsecurity]]></category>
		<category><![CDATA[#nginxvulnerability]]></category>
		<category><![CDATA[#RCE]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ServerSecurity]]></category>
		<category><![CDATA[#ThreatHunting]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#WebSecurity]]></category>
		<category><![CDATA[#ZeroTrust]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11718</guid>

					<description><![CDATA[<p>An NGINX vulnerability tracked as CVE-2026-42945 is being actively exploited by attackers. The flaw affects NGINX Open Source</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/nginx-vulnerability-rce/">NGINX Vulnerability Enables Remote Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>An NGINX vulnerability tracked as CVE-2026-42945 is being actively exploited by attackers. The flaw affects NGINX Open Source and NGINX Plus and could lead to server crashes or remote code execution under specific conditions.</p>



<p>Security researchers observed exploitation attempts within days of the vulnerability becoming public, highlighting how quickly attackers move to abuse flaws in widely used infrastructure software.</p>



<h2 class="wp-block-heading"><strong>How the NGINX Vulnerability Works</strong></h2>



<p>The issue is caused by a heap buffer overflow in the NGINX worker process. Attackers can trigger the flaw by sending specially crafted HTTP requests to vulnerable servers.</p>



<p>Because the vulnerability does not require authentication, exposed systems are at higher risk. In many cases, attackers can crash the NGINX worker process, leading to service disruption. Under specific conditions, the flaw could also be leveraged for remote code execution.</p>



<p>Researchers noted that full remote code execution is more likely on systems where protections such as Address Space Layout Randomization (ASLR) are disabled.</p>



<p>The vulnerability mainly affects servers using specific rewrite configurations, meaning not every NGINX deployment is directly exploitable. However, identifying vulnerable systems at internet scale remains difficult.</p>



<h2 class="wp-block-heading"><strong>Large Exposure and Security Recommendations</strong></h2>



<p>Security researchers estimate that millions of internet-facing NGINX servers could potentially be affected. Even if only a fraction of those systems meet the exact exploitation conditions, the overall attack surface remains significant.</p>



<p>Attackers are already scanning for vulnerable or misconfigured servers, increasing the urgency for organizations to respond quickly.</p>



<p>To reduce risk, security teams should:</p>



<ul class="wp-block-list">
<li>Apply the latest NGINX patches and updates</li>



<li>Review rewrite configurations carefully</li>



<li>Enable protections such as ASLR</li>



<li>Monitor for suspicious or unusual HTTP requests</li>
</ul>



<p>The incident highlights how vulnerabilities in widely deployed technologies can quickly become major security threats, even when exploitation depends on specific configurations.</p>



<p>With active exploitation already underway, rapid patching and continuous monitoring are critical to preventing compromise.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/nginx-vulnerability-rce/">NGINX Vulnerability Enables Remote Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/nginx-vulnerability-rce/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Gamaredon Phishing Attacks Use GammaDrop Malware</title>
		<link>https://firsthackersnews.com/gamaredon-phishing-attacks/</link>
					<comments>https://firsthackersnews.com/gamaredon-phishing-attacks/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 18 May 2026 14:13:00 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberEspionage]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DigitalRisk]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#gamaredon]]></category>
		<category><![CDATA[#gammadrop]]></category>
		<category><![CDATA[#gammaload]]></category>
		<category><![CDATA[#governmentsecurity]]></category>
		<category><![CDATA[#Hacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#ITSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#malwareloader]]></category>
		<category><![CDATA[#phishingattacks]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#spearphishing]]></category>
		<category><![CDATA[#ThreatHunting]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#vbscriptmalware]]></category>
		<category><![CDATA[#winrarvulnerability]]></category>
		<category><![CDATA[#ZeroTrust]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11713</guid>

					<description><![CDATA[<p>A sustained cyber-espionage campaign linked to the Gamaredon threat group is actively targeting Ukrainian government organizations through large-scale</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gamaredon-phishing-attacks/">Gamaredon Phishing Attacks Use GammaDrop Malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A sustained cyber-espionage campaign linked to the Gamaredon threat group is actively targeting Ukrainian government organizations through large-scale phishing attacks and multi-stage malware delivery chains. The operation combines social engineering, abuse of trusted infrastructure, and custom malware loaders to maintain long-term access to compromised systems.</p>



<p>Also tracked as UAC-0010 or Shuckworm, Gamaredon continues to exploit CVE-2025-8088, a directory traversal vulnerability in WinRAR that allows malicious files to be written outside the intended extraction directory. Although the flaw has been widely abused since 2025, researchers noted that Gamaredon’s campaigns stand out due to their persistence, rapid infrastructure rotation, and repeated targeting of Ukrainian government entities.</p>



<h2 class="wp-block-heading">Phishing Campaign Delivers GammaDrop Malware</h2>



<p>The attacks begin with carefully crafted spearphishing emails sent either from compromised Ukrainian government accounts or spoofed domains designed to appear legitimate. Many of these emails mimic official court summons, legal notices, or government-related communications to increase the likelihood of user interaction.</p>



<p>The phishing attachments typically contain malicious RAR or ARJ archives disguised as regular documents. Inside the archive, researchers identified:</p>



<ul class="wp-block-list">
<li>A decoy PDF document used to distract the victim</li>



<li>A hidden VBScript payload stored using NTFS Alternate Data Streams (ADS)</li>
</ul>



<p>When the archive is extracted, the WinRAR vulnerability is abused to silently place the malicious VBScript into the Windows Startup folder. This ensures persistence on the infected machine without requiring additional user interaction.</p>



<p>The first-stage payload, known as GammaDrop, functions as a downloader responsible for retrieving additional malware from attacker-controlled infrastructure. Researchers observed that the script is heavily obfuscated using randomized variables, junk code, and automated generation techniques commonly associated with Gamaredon operations.</p>



<h2 class="wp-block-heading">GammaLoad Expands Persistence and Reconnaissance</h2>



<p>After execution, GammaDrop downloads a second-stage malware component called GammaLoad from infrastructure hosted through Cloudflare Workers. The payload is delivered as an HTA file and launched using mshta.exe in a hidden window to avoid drawing attention.</p>



<p>GammaLoad acts as both a persistence mechanism and a reconnaissance tool. It creates RunOnce registry entries and continuously communicates with command-and-control servers to receive instructions and additional payloads.</p>



<p>The malware collects system-level information including:</p>



<ul class="wp-block-list">
<li>Computer name</li>



<li>System drive details</li>



<li>Volume serial numbers</li>



<li>Victim identification data</li>
</ul>



<p>This information is embedded into beaconing traffic, allowing attackers to uniquely track infected systems and selectively deliver follow-up malware.</p>



<p>Researchers also observed that Gamaredon frequently rotates its infrastructure using fast-flux DNS, dynamic DNS services, and short-lived domains to evade detection. Communication traffic is disguised using legitimate browser user-agent strings, while some newer variants imitate automated services such as Bingbot to blend malicious traffic with normal network activity.</p>



<p>The Security Service of Ukraine (SSU), along with regional government and law enforcement organizations, remains one of the primary targets of these campaigns. Researchers believe the operation’s success is also supported by weak email authentication practices across some targeted domains, where missing or poorly configured SPF, DKIM, and DMARC policies allow attackers to spoof trusted senders more effectively.</p>



<p>Although the malware itself is not considered highly advanced, Gamaredon continues to maintain a strong operational presence through continuous adaptation, large-scale phishing activity, and aggressive infrastructure management.</p>



<p><strong>Security teams are advised to patch vulnerable WinRAR installations immediately, strengthen email authentication controls, monitor suspicious archive-based phishing activity, and block known malicious infrastructure associated with the campaign.</strong></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gamaredon-phishing-attacks/">Gamaredon Phishing Attacks Use GammaDrop Malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/gamaredon-phishing-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Gunra Ransomware Expands Through RaaS Operations</title>
		<link>https://firsthackersnews.com/gunra-ransomware-raas/</link>
					<comments>https://firsthackersnews.com/gunra-ransomware-raas/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 15 May 2026 16:44:32 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#DigitalRisk]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#gunraransomware]]></category>
		<category><![CDATA[#Hacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#ITSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#raas]]></category>
		<category><![CDATA[#ransomware]]></category>
		<category><![CDATA[#RansomwareAttack]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatHunting]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#ZeroTrust]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11709</guid>

					<description><![CDATA[<p>Gunra ransomware is rapidly evolving into a more mature and organized cybercrime operation following its transition from a</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gunra-ransomware-raas/">Gunra Ransomware Expands Through RaaS Operations</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Gunra ransomware is rapidly evolving into a more mature and organized cybercrime operation following its transition from a Conti-based ransomware variant to a dedicated Ransomware-as-a-Service (RaaS) platform. Since emerging in 2025, the group has steadily expanded its operational capabilities, increasing both the scale and sophistication of its attacks.</p>



<p>Initially linked to a limited number of attacks targeting organizations in South Korea, Gunra previously relied on ransomware code associated with the leaked Conti source. However, the group has since developed its own custom ransomware payload and infrastructure, signaling a shift toward long-term operational independence.</p>



<h2 class="wp-block-heading">Transition to a Ransomware-as-a-Service Model</h2>



<p>The move to a RaaS model has significantly expanded Gunra’s reach. Instead of operating alone, the group now allows affiliates to deploy its ransomware tools in exchange for a share of ransom payments.</p>



<p>This affiliate-based structure enables the operation to scale more efficiently while maintaining centralized control over key parts of the attack lifecycle. Researchers observed Gunra actively operating within underground cybercrime forums, where the group promotes its services, recruits affiliates, and advertises stolen data obtained from compromised organizations.</p>



<p>Evidence also suggests coordination between operators and affiliates, with multiple threat actors sharing victim-related data within the same ecosystem. Unlike many established ransomware groups, Gunra permits affiliates to customize branding, increasing the likelihood of attacks appearing under different ransomware names while still relying on the same backend infrastructure.</p>



<h2 class="wp-block-heading">Technical Capabilities and Operational Risks</h2>



<p>Gunra’s ransomware platform supports both Windows and Linux environments, allowing attackers to target a broader range of enterprise infrastructure. The operation includes a feature-rich affiliate management panel designed to streamline ransomware deployment and victim negotiations.</p>



<p>The platform reportedly provides:</p>



<ul class="wp-block-list">
<li>Payload deployment and lock management</li>



<li>File handling and communication tools</li>



<li>Negotiation support for ransom operations</li>



<li>Custom branding options for affiliates</li>
</ul>



<p>Researchers also identified modifications within the Linux variant, including changes to execution behavior, encryption processes, and logging functions. Some cryptographic weaknesses were observed during analysis, which may assist future defensive research efforts.</p>



<p>One of the more concerning aspects of Gunra’s operation is its lack of strict targeting restrictions. Unlike certain ransomware groups that avoid critical sectors such as healthcare, Gunra appears willing to target organizations across multiple industries without significant limitations.</p>



<p>As the group continues expanding its RaaS ecosystem, security teams are advised to strengthen endpoint monitoring, maintain reliable offline backups, enforce strict access controls, and prioritize timely patch management to reduce the risk of ransomware intrusion and lateral movement within enterprise networks.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gunra-ransomware-raas/">Gunra Ransomware Expands Through RaaS Operations</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/gunra-ransomware-raas/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WordPress Plugin Bug Exposes Websites</title>
		<link>https://firsthackersnews.com/wordpress-plugin-vulnerability-access/</link>
					<comments>https://firsthackersnews.com/wordpress-plugin-vulnerability-access/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 15 May 2026 16:27:31 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[wordpress]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#Hacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#ITSecurity]]></category>
		<category><![CDATA[#pluginvulnerability]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#WebSecurity]]></category>
		<category><![CDATA[#websiteprotection]]></category>
		<category><![CDATA[#WebsiteSecurity]]></category>
		<category><![CDATA[#wordpress]]></category>
		<category><![CDATA[#WordPressSecurity]]></category>
		<category><![CDATA[#wordpressvulnerability]]></category>
		<category><![CDATA[#ZeroTrust]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11706</guid>

					<description><![CDATA[<p>A critical vulnerability in a popular WordPress plugin has put more than 200,000 websites at risk of unauthorized</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wordpress-plugin-vulnerability-access/">WordPress Plugin Bug Exposes Websites</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical vulnerability in a popular WordPress plugin has put more than 200,000 websites at risk of unauthorized access. The issue was discovered in the Burst Statistics plugin, a privacy-focused analytics tool widely used across WordPress environments.</p>



<p>Security researchers from Wordfence identified the flaw and warned that attackers could gain administrator-level access without needing valid login credentials.</p>



<h2 class="wp-block-heading"><strong>Authentication Bypass Creates Major Risk</strong></h2>



<p>The vulnerability, tracked as CVE-2026-8181, affects Burst Statistics versions 3.4.0 through 3.4.1.1. It carries a critical CVSS score of 9.8 due to the ease of exploitation and the level of access it provides.</p>



<p>The issue is linked to improper authentication handling within the plugin’s MainWP integration. In certain cases, the plugin incorrectly accepts invalid authentication responses as successful, allowing attackers to bypass security checks.</p>



<p>By sending specially crafted requests to WordPress REST API endpoints, attackers can impersonate an administrator if they know a valid admin username. No password cracking or credential theft is required.</p>



<p>This significantly lowers the barrier for exploitation and increases the risk of automated internet-wide attacks targeting vulnerable websites.</p>



<h2 class="wp-block-heading"><strong>Potential Website Takeover and Security Response</strong></h2>



<p>Once exploited, attackers could create new administrator accounts and gain persistent access to the website. From there, they may modify content, inject malicious code, redirect visitors, or deploy additional malware.</p>



<p>Because the attack only requires knowledge of an administrator username, exposed websites could become easy targets for mass scanning campaigns.</p>



<p>Researchers acted quickly after discovering the issue, and firewall protections were rapidly deployed for users of Wordfence security products. The plugin developer also responded quickly by releasing version 3.4.2, which properly validates authenticated WordPress user sessions before granting access.</p>



<p>Website owners using the Burst Statistics plugin are strongly advised to update immediately to the latest patched version to prevent unauthorized access and possible site compromise.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wordpress-plugin-vulnerability-access/">WordPress Plugin Bug Exposes Websites</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/wordpress-plugin-vulnerability-access/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MongoDB Vulnerability Allows Arbitrary Code Execution</title>
		<link>https://firsthackersnews.com/mongodb-vulnerability-code-execution/</link>
					<comments>https://firsthackersnews.com/mongodb-vulnerability-code-execution/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 14 May 2026 07:24:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CodeExecution]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#databasesecurity]]></category>
		<category><![CDATA[#DigitalRisk]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#Hacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#ITSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#mongodb]]></category>
		<category><![CDATA[#mongodbsecurity]]></category>
		<category><![CDATA[#mongodbvulnerability]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#ThreatHunting]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#ZeroTrust]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11702</guid>

					<description><![CDATA[<p>A critical vulnerability in MongoDB, tracked as CVE-2026-8053, could allow attackers to execute arbitrary code on affected database</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/mongodb-vulnerability-code-execution/">MongoDB Vulnerability Allows Arbitrary Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical vulnerability in MongoDB, tracked as CVE-2026-8053, could allow attackers to execute arbitrary code on affected database servers. This issue poses a serious risk to organizations relying on MongoDB for handling sensitive data and backend operations.</p>



<p>The flaw was identified during internal security testing by <strong>MongoDB</strong> and primarily impacts core MongoDB Server deployments, particularly in self-managed environments.</p>



<h2 class="wp-block-heading"><strong>Technical Overview of the Vulnerability</strong></h2>



<p>The vulnerability enables arbitrary code execution, a class of flaws that allows threat actors to run malicious instructions directly on the host system. This effectively bypasses standard security boundaries and can grant attackers control over the database server.</p>



<p>Given that MongoDB often stores centralized and high-value data, exploitation of this flaw could lead to unauthorized data access, credential exposure, and system-level compromise. Attackers may also leverage the compromised host to establish persistence or pivot laterally within the network.</p>



<p>The issue affects MongoDB versions 5.0 and later in self-hosted deployments, where patch management depends entirely on the organization’s update practices.</p>



<h2 class="wp-block-heading"><strong>Impact and Mitigation</strong></h2>



<p>Managed cloud users of <strong>MongoDB Atlas</strong> are not impacted, as the vulnerability has already been addressed across the platform through centralized patch deployment.</p>



<p>However, self-hosted environments remain exposed until updates are applied. MongoDB has released patched versions, including updates in recent release cycles such as 7.0.31, 8.0.20, and 8.2.7, to mitigate this risk.</p>



<p>Although there is currently no evidence of active exploitation, the nature of arbitrary code execution vulnerabilities makes them highly attractive to attackers. Systems that remain unpatched could be quickly targeted once exploit techniques become publicly available.</p>



<p>Organizations should ensure their MongoDB deployments are updated to the latest secure versions and aligned with current security baselines. Maintaining timely patching and monitoring practices is essential to reduce the risk of compromise.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/mongodb-vulnerability-code-execution/">MongoDB Vulnerability Allows Arbitrary Code Execution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/mongodb-vulnerability-code-execution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zoom Vulnerability Allows Privilege Escalation Attacks</title>
		<link>https://firsthackersnews.com/zoom-vulnerability-privilege-escalation/</link>
					<comments>https://firsthackersnews.com/zoom-vulnerability-privilege-escalation/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 13 May 2026 04:33:29 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#DigitalRisk]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#Hacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#ITSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#PrivilegeEscalation]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#ThreatHunting]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#ZeroTrust]]></category>
		<category><![CDATA[#zoom]]></category>
		<category><![CDATA[#zoomflaw]]></category>
		<category><![CDATA[#zoomsecurity]]></category>
		<category><![CDATA[#zoomvulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11698</guid>

					<description><![CDATA[<p>Zoom has addressed a set of newly discovered vulnerabilities in its software that could be exploited to gain</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zoom-vulnerability-privilege-escalation/">Zoom Vulnerability Allows Privilege Escalation Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Zoom has addressed a set of newly discovered vulnerabilities in its software that could be exploited to gain elevated access or expose sensitive information. These flaws affect Zoom applications on Windows and iOS, with the most critical risks centered around privilege escalation in enterprise environments.</p>



<p>The vulnerabilities allow attackers with basic local access to increase their privileges and operate with administrative-level control. In real-world scenarios, this type of access is often used as a stepping stone for larger attacks, including lateral movement and data exfiltration.</p>



<h2 class="wp-block-heading"><strong>Privilege Escalation Risks in Windows Environments</strong></h2>



<p>Two high-severity vulnerabilities, each rated with a CVSS score of 7.8, impact Zoom’s Windows-based components.</p>



<p>The first issue affects Zoom Rooms for Windows and is caused by an untrusted search path vulnerability within the installer. This means the application may load files from unintended locations, allowing attackers to inject malicious code during execution.</p>



<p>The second flaw targets the Zoom Workplace VDI Plugin. It stems from improper control over file names and paths in the installation process. By manipulating these paths, an attacker can execute arbitrary code and escalate privileges.</p>



<p>These vulnerabilities are particularly dangerous because they require minimal effort to exploit once initial access is obtained. Attackers can leverage them to:</p>



<ul class="wp-block-list">
<li>Disable or bypass endpoint security controls</li>



<li>Access and extract sensitive enterprise data</li>



<li>Maintain persistence within the environment</li>



<li>Move laterally across systems inside the network</li>



<li>Deploy additional payloads such as ransomware</li>
</ul>



<p>Such privilege escalation flaws are highly valuable in targeted attacks, especially in corporate environments where Zoom is widely used.</p>



<h2 class="wp-block-heading"><strong>iOS Vulnerability and Overall Impact</strong></h2>



<p>A separate vulnerability affects Zoom Workplace on iOS devices, though its severity is significantly lower. This issue involves a failure in a protection mechanism that could allow limited data exposure.</p>



<p>However, exploitation requires physical access to the device, which reduces the likelihood of large-scale attacks. Still, it highlights the importance of securing mobile endpoints alongside desktop systems.</p>



<p>The key concern across all these vulnerabilities is the potential for unauthorized access to sensitive data and system resources, particularly in organizations that rely heavily on collaboration tools.</p>



<p>To address these risks, <strong>Zoom Video Communications</strong> has released security patches for all affected components. Because these flaws are now publicly disclosed, unpatched systems may become targets for active exploitation.</p>



<p>Users and organizations should immediately update:</p>



<ul class="wp-block-list">
<li>Zoom Rooms for Windows to version 7.0.0 or later</li>



<li>Zoom Workplace VDI Plugin to version 6.6.11 or newer</li>



<li>Zoom Workplace for iOS to version 7.0.0 or above</li>
</ul>



<p>Timely patching, combined with proper access controls and endpoint monitoring, is essential to prevent these vulnerabilities from being exploited in real-world attacks.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zoom-vulnerability-privilege-escalation/">Zoom Vulnerability Allows Privilege Escalation Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zoom-vulnerability-privilege-escalation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
