Tag: vulnerability

Browse our exclusive articles!

QNAP NetBak Replicator Flaw Lets Attackers Execute Unauthorized Code

QNAP Systems has disclosed a critical vulnerability in its NetBak Replicator backup software that could enable local attackers to execute arbitrary code on affected...

Proof-of-Concept Published for Sudo Vulnerability That Grants Root Access

A critical security incident has shaken the Linux community following the release of a proof-of-concept (PoC) exploit for CVE-2025-32463, a high-severity local privilege escalation...

PoC Released for Oracle E-Business Suite 0-Day – Remote Exploit Available

Oracle has issued an urgent security alert for a critical zero-day vulnerability affecting Oracle E-Business Suite that allows remote code execution without authentication. The...

DrayOS Routers Vulnerability Enables Remote Code Execution

Researchers disclosed a critical security flaw in DrayOS-powered enterprise routers that allows unauthenticated remote attackers to trigger memory corruption, system crashes, and potentially execute...

Chinese Threat Actors Exploit High-Value IIS Servers to Manipulate Search Rankings

Cisco Talos has uncovered a widespread campaign by a Chinese-speaking cybercrime group dubbed UAT-8099. Since April 2025, UAT-8099 has systematically targeted vulnerable Internet Information...

Popular

Apple’s iOS 26 Removes Pegasus and Predator Spyware Evidence by Replacing the ‘shutdown.log’ File

Apple's latest operating system update, iOS 26, inadvertently introduces...

Vulnerabilities in HashiCorp Vault Allow Attackers to Bypass Authentication and Launch DoS Attack

HashiCorp has disclosed a critical, unauthenticated denial-of-service vulnerability in...

New EDR-Redir Tool Bypasses EDR via Bind and Cloud Filter Drivers

A cybersecurity researcher has unveiled EDR-Redir, a new tool...

Critical Dell Storage Manager Bugs Enable Remote System Compromise

Dell Technologies has disclosed three critical vulnerabilities in its...

Subscribe

spot_imgspot_img