Security News

Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse
2025-04-02 13:48

Cybersecurity researchers have disclosed details of a now-patched privilege escalation vulnerability in Google Cloud Platform (GCP) Cloud Run that could have allowed a malicious actor to access...

BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework
2025-04-02 04:30

BlueToolkit is an open-source tool that helps find security flaws in Bluetooth Classic devices. It runs known and custom exploits to test if a device is vulnerable. Right now, it includes 43...

Attackers are targeting CrushFTP vulnerability with public PoC (CVE-2025-2825)
2025-04-01 15:35

Exploitation attempts targeting the CVE-2025-2825 vulnerability on internet-facing CrushFTP instances are happening, the Shadowserver Foundation has shared on Monday, and the attackers have been...

BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
2025-03-29 03:52

In what's an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial...

Mozilla Patches Critical Firefox Bug Similar to Chrome’s Recent Zero-Day Vulnerability
2025-03-28 05:44

Mozilla has released updates to address a critical security flaw impacting its Firefox browser for Windows, merely days after Google patched a similar flaw in Chrome that came under active...

CrushFTP: Patch critical vulnerability ASAP! (CVE-2025-2825)
2025-03-27 11:12

CrushFTP has fixed a critical vulnerability (CVE-2025-2825) in its enterprise file transfer solution that could be exploited by remote, unauthenticated attackers to access vulnerable...

Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication
2025-03-24 18:55

A set of five critical security shortcomings have been disclosed in the Ingress NGINX Controller for Kubernetes that could result in unauthenticated remote code execution, putting over 6,500...

Critical Next.js auth bypass vulnerability opens web apps to compromise (CVE-2025-29927)
2025-03-24 13:07

A critical vulnerability (CVE-2025-29927) in the open source Next.js framework can be exploited by attackers to bypass authorization checks and gain unauthorized access to web pages they should no...

Critical Next.js Vulnerability Allows Attackers to Bypass Middleware Authorization Checks
2025-03-24 09:17

A critical security flaw has been disclosed in the Next.js React framework that could be potentially exploited to bypass authorization checks under certain conditions. The vulnerability, tracked...

NAKIVO Backup & Replication vulnerability exploited by attackers (CVE-2024-48248)
2025-03-21 11:31

A vulnerability (CVE-2024-48248) in NAKIVO Backup and Replication, a backup, ransomware protection and disaster recovery solution designed for organizations of all sizes and managed service...