Tag: vulnerability

Browse our exclusive articles!

Google Cloud Vulnerability Enables Privilege Escalation and Data Access

A critical privilege escalation vulnerability in Google Cloud Platform’s (GCP) Cloud Run service, dubbed "ImageRunner," has been uncovered and subsequently patched. Discovered by Tenable...

Rockwell Automation Flaw Exposes Systems to Remote Command Execution

A critical vulnerability (CVE-2025-1449) in Rockwell Automation’s Verve Asset Manager enables authenticated administrators to execute arbitrary commands on industrial control systems. The flaw, rated...

CrushFTP Warns of Critical HPPS Port Vulnerability Exposing Servers

In a recent security advisory, CrushFTP, a popular file transfer software provider, has disclosed a critical vulnerability affecting both versions 10 and 11 of...

Critical Chrome Exploit Lets Hackers Run Malicious Code

Google has released a crucial security update for its Chrome browser, addressing a critical vulnerability that could potentially allow remote attackers to exploit heap...

Unauthorized RDWeb Access to Several Firms Reportedly for Sale

The cybersecurity landscape faces a new challenge as reports emerge of unauthorized Remote Desktop Web (RDWeb) access being sold on dark web forums. This...

Popular

Apple’s iOS 26 Removes Pegasus and Predator Spyware Evidence by Replacing the ‘shutdown.log’ File

Apple's latest operating system update, iOS 26, inadvertently introduces...

Vulnerabilities in HashiCorp Vault Allow Attackers to Bypass Authentication and Launch DoS Attack

HashiCorp has disclosed a critical, unauthenticated denial-of-service vulnerability in...

New EDR-Redir Tool Bypasses EDR via Bind and Cloud Filter Drivers

A cybersecurity researcher has unveiled EDR-Redir, a new tool...

Critical Dell Storage Manager Bugs Enable Remote System Compromise

Dell Technologies has disclosed three critical vulnerabilities in its...

Subscribe

spot_imgspot_img