Vulnerability
- APPLICATIONS
CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability
Jun 18, 2025Ravie LakshmananLinux / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed a security flaw…
Read More » - APPLICATIONS
Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
A novel attack technique named EchoLeak has been characterized as a “zero-click” artificial intelligence (AI) vulnerability that allows bad actors…
Read More » - APPLICATIONS
Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks
A now-patched critical security flaw in the Wazur Server is being exploited by threat actors to drop two different Mirai…
Read More » - APPLICATIONS
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin
May 29, 2025Ravie LakshmananVulnerability / Website Security Cybersecurity researchers have disclosed a critical unpatched security flaw impacting TI WooCommerce Wishlist…
Read More » - APPLICATIONS
GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts
Cybersecurity researchers have discovered an indirect prompt injection flaw in GitLab’s artificial intelligence (AI) assistant Duo that could have allowed…
Read More » - APPLICATIONS
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise
May 22, 2025Ravie LakshmananCybersecurity / Vulnerability A privilege escalation flaw has been demonstrated in Windows Server 2025 that makes it…
Read More » - APPLICATIONS
New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy
May 15, 2025Ravie LakshmananBrowser Security / Web Security Google on Wednesday released updates to address four security issues in its…
Read More » - APPLICATIONS
Beyond Vulnerability Management – Can You CVE What I CVE?
The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and process, strains security teams. Capacity…
Read More » - APPLICATIONS
How to Automate CVE and Vulnerability Advisory Response with Tines
May 02, 2025The Hacker NewsVulnerability Management / Security Operations Run by the team at workflow orchestration and AI platform Tines,…
Read More » - APPLICATIONS
Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
Apr 25, 2025Ravie LakshmananVulnerability / Data Breach Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server…
Read More »