#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
DevSecOps

ClamAV | Breaking Cybersecurity News | The Hacker News

Category — ClamAV
Cisco Fixes Critical Privilege Escalation Flaw in Meeting Management (CVSS 9.9)

Cisco Fixes Critical Privilege Escalation Flaw in Meeting Management (CVSS 9.9)

Jan 23, 2025 Network Security / Vulnerability
Cisco has released software updates to address a critical security flaw impacting Meeting Management that could permit a remote, authenticated attacker to gain administrator privileges on susceptible instances. The vulnerability, tracked as CVE-2025-20156, carries a CVSS score of 9.9 out 10.0. It has been described as a privilege escalation flaw in the REST API of Cisco Meeting Management. "This vulnerability exists because proper authorization is not enforced upon REST API users," the company said in a Wednesday advisory. "An attacker could exploit this vulnerability by sending API requests to a specific endpoint." "A successful exploit could allow the attacker to gain administrator-level control over edge nodes that are managed by Cisco Meeting Management." The networking equipment major credited Ben Leonard-Lagarde of Modux for reporting the security shortcoming. It affects the following versions of the product irrespective of device configuratio...
How to Use Linux to Rescue a Malware-Infected Computer

How to Use Linux to Rescue a Malware-Infected Computer

Oct 30, 2010 Cybersecurity / IT Solutions
If you use Linux on your company's desktop or server computers, you're likely familiar with the security advantages the open-source operating system offers over Windows and Mac. What many people don't realize, however, is that Linux can also rescue a computer crippled by malware. Malware is a frequent issue in the Windows world, and it can be devastating. When a Windows virus strikes, it can become difficult or even impossible to continue using the affected machine. Moreover, prolonged use can further the infection. Here's how Linux can help you recover from such a situation without ever installing it permanently on your PC. Step 1: Get a LiveCD or Live USB LiveCDs and USBs are great because they let you boot a machine directly from the CD or USB stick without accessing the computer's boot records. They allow you to test Linux and can be used when Windows fails. The fastest way to get a LiveCD or USB is to download the .iso file of the Linux distribution you wan...
Why The Modern Google Workspace Needs Unified Security

Why The Modern Google Workspace Needs Unified Security

Mar 10, 2025Data Protection / SaaS Security
The Need For Unified Security Google Workspace is where teams collaborate, share ideas, and get work done. But while it makes work easier, it also creates new security challenges. Cybercriminals are constantly evolving, finding ways to exploit misconfigurations, steal sensitive data, and hijack user accounts. Many organizations try to secure their environment by piecing together different security tools, hoping that multiple layers of protection will keep them safe.  But in reality, this patchwork approach often creates blind spots, making it harder—not easier—to defend against threats. To truly secure Google Workspace, businesses need a unified security strategy that offers complete protection without unnecessary complexity. The problem with most security solutions is that they only solve part of the puzzle. Point solutions, like tools that block malware or phishing attacks, might work well for a specific type of threat but fail to recognize suspicious user behavior, unauthori...
Cybersecurity
Expert Insights / Articles Videos
Cybersecurity Resources