VoidLink Signals a New Era of Linux Rootkits in Cloud Environments
VoidLink has emerged as a serious threat to Linux-based cloud infrastructure, marking a clear shift in how modern rootkits are designed and deployed. Unlike older Linux malware that often struggled [...]
Critical Privilege Escalation Vulnerabilities Discovered in Google Vertex AI
Default Service Agent Permissions Expose High-Risk Identity Paths Security researchers have uncovered critical privilege escalation vulnerabilities in Google Cloud’s Vertex AI platform, allowing attackers with minimal permissions to gain control [...]
Android Volume Button Bug Tied to Select to Speak Feature
Google has confirmed an Android bug that affects how volume buttons behave when the Select to Speak accessibility feature is enabled. The issue interferes with everyday actions like adjusting media [...]
Security Bypass Issue Found in Windows Remote Assistance
Microsoft has addressed a security weakness in Windows Remote Assistance that could allow attackers to bypass built-in protection mechanisms and access sensitive data under certain conditions. The vulnerability, tracked as [...]
Critical Cal.com Vulnerability Enables Account Takeover
A newly disclosed critical vulnerability in Cal.com, an open-source scheduling and booking platform, could allow attackers to bypass authentication and take over user accounts without valid credentials. The issue affects [...]