Vulnerability

Garak – An Open Source LLM Vulnerability Scanner for AI Red-TeamingGarak – An Open Source LLM Vulnerability Scanner for AI Red-Teaming

Garak – An Open Source LLM Vulnerability Scanner for AI Red-Teaming

Garak is a free, open-source tool specifically designed to test the robustness and reliability of Large Language Models (LLMs). Inspired…

3 months ago
Windows Registry Privilege Escalation Vulnerability – PoC ReleasedWindows Registry Privilege Escalation Vulnerability – PoC Released

Windows Registry Privilege Escalation Vulnerability – PoC Released

Researchers have released a proof of concept (PoC) exploit for a critical privilege escalation vulnerability affecting Microsoft Windows. This vulnerability,…

3 months ago
ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary CommandsASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several of its router models.  These flaws,…

3 months ago
iTerm2 Emulator Vulnerability Let Attackers Access Sensitive User DataiTerm2 Emulator Vulnerability Let Attackers Access Sensitive User Data

iTerm2 Emulator Vulnerability Let Attackers Access Sensitive User Data

 A critical vulnerability discovered in the popular macOS terminal emulator iTerm2 has raised concerns among cybersecurity experts and software users.…

3 months ago
Trend Micro Apex One Vulnerabilities Let Escalate PrivilegeTrend Micro Apex One Vulnerabilities Let Escalate Privilege

Trend Micro Apex One Vulnerabilities Let Escalate Privilege

Trend Micro has addressed six high-severity vulnerabilities in its Apex One and Apex One as a Service product, which could allow attackers to escalate…

3 months ago
D-Link Warns of Botnets Exploiting End-of-Life RoutersD-Link Warns of Botnets Exploiting End-of-Life Routers

D-Link Warns of Botnets Exploiting End-of-Life Routers

D-Link warned users of several legacy router models about known vulnerabilities actively exploited by botnets. These devices, which have reached…

3 months ago
CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in WildCISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a critical vulnerability in Palo Alto…

3 months ago
TrueNAS CORE Vulnerability Let Attackers Execute Remote CodeTrueNAS CORE Vulnerability Let Attackers Execute Remote Code

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a critical vulnerability in TrueNAS CORE,…

3 months ago
PoC Exploited Released for Oracle Weblogic Server VulnerabilityPoC Exploited Released for Oracle Weblogic Server Vulnerability

PoC Exploited Released for Oracle Weblogic Server Vulnerability

Security researchers have warned that a Proof-of-Concept (PoC) exploit has been publicly released for a critical vulnerability affecting Oracle WebLogic…

3 months ago
Microsoft Warns of Windows 11 24H2 Issue that Blocks Windows Security UpdatesMicrosoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates

Microsoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates

Microsoft has issued a warning about a significant issue impacting devices running Windows 11, version 24H2, that could block essential…

3 months ago