A security vulnerability in Apache Airflow, a widely used workflow management platform, could lead to the unintentional exposure of sensitive configuration data, posing a significant risk to system security. Identified as CVE-2024-45784, this flaw has been given a CVSS score of 7.5, categorizing it as a high-severity issue. The vulnerability affects all Airflow versions prior to 2.10.3 and arises from the platform’s failure to automatically mask sensitive configuration data in task logs. As a result, Directed Acyclic Graph (DAG) authors may inadvertently log critical information, such as API keys, database credentials, or other sensitive data. If these logs are accessed by unauthorized individuals, the exposed information could be used to compromise the Airflow deployment. This vulnerability could allow attackers to extract confidential data, including customer records, financial information, or proprietary code. Additionally, leaked credentials could grant unauthorized access to critical systems and infrastructure. Attackers might also exploit these compromised systems to move laterally within the network, potentially gaining access to other sensitive resources.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...