PoC Exploit Released for Sudo Vulnerability that Enables Attackers to Gain Root Access
A publicly available proof-of-concept (PoC) exploit has been released for CVE-2025-32463, a local privilege escalation (LPE) flaw in the Sudo...
Read more →A publicly available proof-of-concept (PoC) exploit has been released for CVE-2025-32463, a local privilege escalation (LPE) flaw in the Sudo...
Read more →A sophisticated technique uncovered where threat actors abuse Amazon Web Services‘ X-Ray distributed tracing service to establish covert command and...
Read more →A critical zero-day vulnerability in Oracle E-Business Suite has emerged as a significant threat to enterprise environments, with proof-of-concept (PoC)...
Read more →A zero-day vulnerability in the Zimbra Collaboration Suite (ZCS) was actively exploited in targeted attacks earlier in 2025. The flaw,...
Read more →Microsoft has announced a significant security enhancement for Outlook users, implementing the retirement of inline SVG image support across Outlook...
Read more →Unity Technologies has issued a critical security advisory warning developers about a high-severity vulnerability affecting its widely used game development...
Read more →A newly disclosed vulnerability, named the WireTap attack, allows attackers with physical access to break the security of Intel’s Software...
Read more →A groundbreaking cybersecurity vulnerability has emerged that transforms Perplexity’s AI-powered Comet browser into an unintentional collaborator for data theft. Security...
Read more →A data breach at a third-party customer service provider has exposed the personal data of some Discord users, including names,...
Read more →Renault UK has notified customers of a data breach after a cyberattack on one of its third-party service providers resulted...
Read more →A cybercrime collective known as Scattered LAPSUS$ Hunters has launched a new data leak site on the dark web, claiming...
Read more →Grafana, the popular open-source analytics and visualization platform, has once again become the target of a large‐scale, coordinated exploitation effort. ...
Read more →