A trio of bugs could allow hackers to escalate privileges and remotely execute code on virtual machines deployed across cloud environments.
...moreTop Articles:
Published: 2024-06-18 20:23:24
Popularity: 32
Author: Nate Nelson, Contributing Writer
A trio of bugs could allow hackers to escalate privileges and remotely execute code on virtual machines deployed across cloud environments.
...morePublished: 2024-03-21 17:13:23
Popularity: 13
Author: Nate Nelson, Contributing Writer
A bug exposed users of an AWS workflow management service to cookie tossing, but behind the scenes lies an even deeper issue that runs across all of the top cloud services.
...morePublished: 2024-01-26 21:00:00
Popularity: 9
Author: Nate Nelson, Contributing Writer
The threat actor went more than half a decade before being discovered — thanks to a remarkable backdoor delivered in invisible adversary-in-the-middle attacks.
...morePublished: 2023-05-22 20:52:00
Popularity: 45
Author: Nate Nelson, Contributing Writer, Dark Reading
The climate of concern around open source security and supply chain attacks may have caused a small story to become a big one.
...morePublished: 2024-05-17 12:00:00
Popularity: 63
Author: Nate Nelson, Contributing Writer
A number of serious Windows bugs still haven't made their way into criminal circles, but that won't remain the case forever — and time is running short before ZDI releases exploit details.
...morePublished: 2024-05-10 18:21:29
Popularity: 9
Author: Nate Nelson, Contributing Writer
CISA's agreement is voluntary and, frankly, basic. Signatories say that's a good thing.
...morePublished: 2024-05-20 19:31:25
Popularity: 95
Author: Nate Nelson, Contributing Writer
An on-by-default endpoint in ubiquitous logging service Fluent Bit contains an oversight that hackers can toy with to rattle most any cloud environment.
...morePublished: 2024-07-25 20:51:01
Popularity: 43
Author: Nate Nelson, Contributing Writer
The fake updates are part of a phishing and fraud surge that is both more voluminous and more targeted that the usual activity around national news stories.
...morePublished: 2024-08-22 19:42:04
Popularity: None
Author: Nate Nelson, Contributing Writer
A 7-month-old bug in an OSS CI/CD server is still being actively exploited, thanks to spotty patching, CISA warns.
...morePublished: 2024-09-11 13:00:44
Popularity: 62
Author: Nate Nelson, Contributing Writer
In the "PixHell" attack, sound waves generated by pixels on a screen can transmit information across seemingly impenetrable air gaps.
...morePublished: 2024-09-17 21:26:38
Popularity: 14
Author: Nate Nelson, Contributing Writer
A researcher bypassed the Calendar sandbox, Gatekeeper, and TCC in a chain attack that allowed for wanton theft of iCloud photos.
...more