Vulnerability

Active Exploitation of New CrushFTP 0-Day Vulnerability Grants Attackers Server Access

A critical zero-day vulnerability in CrushFTP servers has been actively exploited by attackers since July 18th, 2025, with security researchers…

9 months ago

Ubiquiti UniFi Device Vulnerability Enables Remote Command Injection by Attackers

Ubiquiti Networks has disclosed a critical security vulnerability affecting multiple UniFi Access devices that could enable malicious actors to execute…

9 months ago

Lenovo Protection Driver Vulnerability Allows Privilege Escalation and Remote Code Execution

A critical buffer overflow vulnerability has been identified in Lenovo’s Protection Driver, exposing users of various Lenovo applications to potential…

9 months ago

Hackers Exploit Signal App Clone Vulnerability to Steal Passwords

A critical security vulnerability in TeleMessageTM SGNL, an enterprise messaging system designed to mirror Signal's secure communication features, has been…

9 months ago

Microsoft Entra ID Vulnerability Enables Privilege Escalation to Global Administrator

A critical vulnerability in Microsoft's Entra ID (formerly Azure Active Directory) that allows attackers to escalate privileges and impersonate any…

9 months ago

Oracle Cloud Code Editor 1-Click RCE Vulnerability Allows Remote Shell Access via Malicious File Upload

A critical Remote Code Execution (RCE) vulnerability in Oracle Cloud Infrastructure's (OCI) Code Editor that enabled attackers to silently hijack…

9 months ago

SharePoint RCE Vulnerability Exploited via Malicious XML in Web Part

A serious remote code execution vulnerability has been discovered in Microsoft SharePoint that allows attackers to execute arbitrary code through…

9 months ago

Hackers Exploited CitrixBleed 2 Vulnerability Ahead of Public PoC Release

The vulnerability, designated CVE-2025-5777 and dubbed "CitrixBleed 2," represents a significant security concern for organizations relying on Citrix infrastructure. Cybersecurity…

9 months ago

Cisco Intelligence Center Vulnerability Enables Remote File Upload Attacks

Cisco disclosed a critical weakness within the web-based management interface of its Unified Intelligence Center (CUIC) that can be exploited…

9 months ago

Google’s AI ‘Big Sleep’ Identifies SQLite 0-Day Vulnerability in Active Use

Google's artificial intelligence-powered security tool Big Sleep has achieved a cybersecurity milestone by discovering and preventing the active exploitation of…

9 months ago