Tag: vulnerability

Browse our exclusive articles!

Signal Implements Hybrid Post-Quantum Ratchet to Mitigate Quantum Computing Risks

Signal, the widely used end-to-end encrypted messaging platform, has unveiled a pioneering cryptographic advancement designed to counter the looming threat posed by quantum computers....

WestJet Confirms Data Breach – Customers’ Personal Information Exposed

WestJet Airlines has officially confirmed that a cybersecurity incident earlier this year resulted in the unauthorized access and exposure of certain personal information belonging...

Multiple NVIDIA Vulnerabilities Allow Attackers to Escalate Privileges

NVIDIA has released a critical software update for the NVIDIA App to address newly discovered vulnerabilities that could allow local attackers to escalate privileges....

Red Hat OpenShift AI Vulnerability Lets Attackers Seize Infrastructure Control

A critical flaw in the Red Hat OpenShift AI (RHOAI) service allows attackers with minimal access to escalate privileges and seize full control of...

Gemini Vulnerabilities in Google AI Platform Enable Data and Location Exfiltration

Tenable Research identified three distinct vulnerabilities in Google’s Gemini, showing how modern AI platforms can be leveraged as both targets and vehicles of attack: Search-injection...

Popular

Apple’s iOS 26 Removes Pegasus and Predator Spyware Evidence by Replacing the ‘shutdown.log’ File

Apple's latest operating system update, iOS 26, inadvertently introduces...

Vulnerabilities in HashiCorp Vault Allow Attackers to Bypass Authentication and Launch DoS Attack

HashiCorp has disclosed a critical, unauthenticated denial-of-service vulnerability in...

New EDR-Redir Tool Bypasses EDR via Bind and Cloud Filter Drivers

A cybersecurity researcher has unveiled EDR-Redir, a new tool...

Critical Dell Storage Manager Bugs Enable Remote System Compromise

Dell Technologies has disclosed three critical vulnerabilities in its...

Subscribe

spot_imgspot_img