Saturday, May 2, 2026
HomeUncategorized

Uncategorized

Critical Apache SeaTunnel Vulnerability Allows Unauthenticated Deserialization

A moderate-severity security vulnerability has been discovered in Apache SeaTunnel, a distributed data integration platform, affecting versions 2.3.1 through 2.3.10. The vulnerability enables unauthorized users to execute arbitrary file read operations and deserialization attacks through the platform's RESTful API, potentially compromising system security...

Critical IBM QRadar SIEM Vulnerabilities Enables Remote Command Execution

IBM has disclosed multiple critical security vulnerabilities in its QRadar Security Information and Event Management (SIEM) platform that could enable attackers to gain unauthorized access to sensitive data and execute arbitrary commands on affected systems. The vulnerabilities, published on June 19, 2025, affect QRadar...

Tesla Wall Charger Vulnerability Exposed in Swift 18-Minute Attack

A critical vulnerability in Tesla's Wall Connector home charging stations, proving that attackers can gain control of the devices through the charging port itself in just 18 minutes. The attack, showcased at the Pwn2Own competition by cybersecurity firm Synacktiv, exploits a previously unknown communication...

Hackers Exploit Atlassian’s Model Context Protocol via Malicious Support Ticket

A critical vulnerability in AI-integrated enterprise systems that allows threat actors to gain privileged access through seemingly innocent support tickets. This attack method, dubbed "Living off AI," exploits the Model Context Protocol (MCP) implementations in platforms like Atlassian's Jira Service Management, demonstrating how the...

New Nday Vulnerability in Zyxel NWA50AX Pro Enables Arbitrary File Deletion

A vulnerability researcher has discovered a critical security vulnerability in Zyxel NWA50AX Pro WiFi 6 access points that allows unauthenticated attackers to delete arbitrary files on affected devices. The vulnerability, discovered during a mountain vacation, represents an nday variant of previously known issues affecting...

Attackers Exploit Apple Pay and GPay to Steal Funds

Mobile wallets such as Apple Pay and Google Pay have revolutionized payment systems by enabling contactless transactions, but their convenience comes with hidden risks. Security researchers have identified critical vulnerabilities in features like Apple Pay’s Express Transit mode, which bypasses authentication protocols to speed...