A critical security vulnerability has been discovered in LG Innotek's LNV5110R camera model that could allow remote attackers to gain full administrative control of the devices.
The Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory on July 24, 2025, warning that the authentication...
Salesforce has disclosed multiple critical security vulnerabilities affecting Tableau Server installations worldwide, with the most severe vulnerabilities enabling remote code execution and unauthorized database access.
The vulnerabilities, addressed in the June 26, 2025 maintenance release, pose significant risks to organizations using affected versions of...
Critical vulnerabilities in Tridium's Niagara Framework®, a widely-used software platform that connects and manages diverse devices in building automation, industrial control systems, and smart infrastructure environments.
These vulnerabilities, if exploited under specific conditions, could allow attackers to compromise entire Niagara systems and collect sensitive...
A critical vulnerabilities in VMware Tools that could allow attackers with basic user access to escalate privileges to full system control.
The vulnerabilities, discovered by penetration tester Sergey Bliznyuk from PT Security, affect the VMware Guest Authentication Service (VGAuth) component and have been assigned...
Five critical security vulnerabilities in Bloomberg's open-source Comdb2 database that could allow attackers to launch denial-of-service attacks through specially crafted network packets.
The vulnerabilities, affecting version 8.1 of the high-availability database system, have been successfully patched by Bloomberg following responsible disclosure practices.
Three severe null...
An advanced espionage campaign designated "Fire Ant" that has been targeting virtualization and networking infrastructure since early 2025.
The sophisticated threat actors demonstrated exceptional persistence and operational resilience, adapting in real-time to eradication efforts while maintaining prolonged access to compromised systems.
The campaign's techniques...