Monday, April 27, 2026
HomeUncategorized

Uncategorized

Over 4 Million Internet-Exposed Devices Exploited in Emerging DoS Attacks

A staggering 4.26 million vulnerable Internet-connected devices that can be exploited to launch devastating denial-of-service (DoS) attacks. The comprehensive study, published in their latest research paper, reveals that these exposed systems accept unauthenticated tunneling traffic from any source, creating a massive attack surface that...

Massive Cyberattack Hits Co-op, Exposes Data of 6.5 Million Members

The chief executive of Co-op has confirmed that all 6.5 million of its members had their personal data stolen in a devastating cyber-attack that hit the UK retailer in April. In her first public interview since the breach, CEO Shirine Khoury-Haq expressed her devastation...

NVIDIA Container Toolkit Vulnerabilities Enables Attackers to Run Code with Elevated Privileges

NVIDIA has released critical security updates for its Container Toolkit and GPU Operator following the discovery of two high-severity vulnerabilities that could allow attackers to execute arbitrary code with elevated permissions and cause system disruption. The vulnerabilities, tracked as CVE-2025-23266 and CVE-2025-23267, affect all...

Oracle Cloud Code Editor 1-Click RCE Vulnerability Allows Remote Shell Access via Malicious File Upload

A critical Remote Code Execution (RCE) vulnerability in Oracle Cloud Infrastructure's (OCI) Code Editor that enabled attackers to silently hijack users' Cloud Shell environments through a single malicious webpage visit. The vulnerability, now remediated by Oracle, exploited a Cross-Site Request Forgery (CSRF) vulnerability that...

DNS Queries Abused by Hackers for Stealthy C2 and Data Exfiltration

Cybercriminals are increasingly exploiting the Domain Name System (DNS) - often called the "phonebook of the internet" - to conduct covert command-and-control operations and data exfiltration. This sophisticated attack method leverages DNS's trusted status within corporate networks, where traffic typically passes through firewalls with...

SharePoint RCE Vulnerability Exploited via Malicious XML in Web Part

A serious remote code execution vulnerability has been discovered in Microsoft SharePoint that allows attackers to execute arbitrary code through malicious XML payloads embedded within Web Part components. The vulnerability, which affects SharePoint version 15.0.5145.1000 and potentially others, exploits the deserialization process of WebPart...