SIEM as a Service
Home Vulnerabilities

Vulnerabilities

Explore the Vulnerabilities category on our cybersecurity news blog for up-to-date coverage of critical software flaws and security gaps. From zero-day exploits to newly discovered bugs, we bring you expert insights on how these vulnerabilities impact businesses and individuals.

Learn about affected systems, potential risks, and mitigation strategies to safeguard your data and infrastructure. Stay informed with real-time updates, technical analyses, and actionable advice for addressing emerging threats.

Firefox 138 Released

Firefox 138 Released With Fix for Multiple High-Severity Vulnerabilities

Mozilla has released Firefox 138, addressing several high-severity security vulnerabilities while introducing long-awaited features, including improved profile management.  Security researchers identified multiple critical flaws that could allow attackers to escalate privileges or bypass security mechanisms,...
CISA Adds Broadcom Brocade Fabric OS Vulnerability

CISA Adds Broadcom Brocade Fabric OS Vulnerability to Known Exploited Vulnerabilities Catalog

CISA officially added a significant security flaw affecting Broadcom’s Brocade Fabric OS to its authoritative Known Exploited Vulnerabilities (KEV) Catalog, underscoring the urgent need for remediation across enterprise and government environments.  The vulnerability, tracked as...
Qualcomm-Based Android Phones

New GPAUF Technique to Root Qualcomm-Based Android Phones

Rooting is a technique that lets users or attackers achieve privileged control over the operating system, circumventing manufacturer and carrier constraints.  Senior mobile security researchers Pan Zhenpeng and Jheng Bing Jhong from STAR Labs have...
React Router Vulnerabilities

React Router Vulnerabilities Let Attackers Spoof Contents & Modify Values

Significant security flaws have been discovered in React Router, a widely-used routing library for React applications, potentially allowing attackers to corrupt content, poison caches, and manipulate pre-rendered data.  The vulnerabilities, which impact applications running in...
CISA Warns Planet Technology Network

CISA Warns Planet Technology Network Products Let Attackers Manipulate Devices

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory warning of multiple high-severity vulnerabilities in Planet Technology network products that could allow attackers to gain administrative control over affected devices without...
XDR In Penetration Testing

XDR In Penetration Testing: Leveraging Advanced Detection To Find Vulnerabilities

Extended Detection and Response (XDR) has emerged as a transformative security technology that unifies visibility across multiple security layers. When applied to penetration testing methodologies, XDR offers unprecedented capabilities for identifying vulnerabilities that might...
GitLab Security Update

GitLab Security Update – Patch for XSS, DoS & Account Takeover Vulnerabilities

GitLab has released critical security patches addressing multiple high-severity vulnerabilities in its platform, highlighting robust security measures amid increasing cyber threats.  The company has issued patch versions 17.11.1, 17.10.5, and 17.9.7 for both Community Edition...
Critical Vulnerabilities in Browser Wallets Let Attackers Drain your Funds

Critical Vulnerabilities in Browser Wallets Let Attackers Drain your Funds

Significant vulnerabilities in popular browser-based cryptocurrency wallets enable attackers to steal funds without any user interaction or approval.  These critical flaws, discovered in wallets including Stellar Freighter, Frontier Wallet, and Coin98, represent a significant shift...
CISA Releases Five Advisories Covering ICS

CISA Releases Five Advisories Covering ICS Vulnerabilities & Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has released five new advisories addressing critical vulnerabilities in Industrial Control Systems (ICS) from Siemens, Schneider Electric, and ABB.  These advisories, published on April 22, 2025, provide detailed...
Zoom’s Remote Control Feature

Hackers Leverage Zoom’s Remote Control Feature to Gain Users’ System Access

A sophisticated attack campaign by threat actor ELUSIVE COMET that exploits Zoom's legitimate remote control feature to gain unauthorized access to victims' computers.  The attackers have successfully targeted cryptocurrency professionals using a combination of social...
SIEM as a Service

Recent Posts

New Germlin Stealer Advertised on Hacker Forums Steals Credit Card Data...

Cybersecurity researchers have identified a new information-stealing malware called Gremlin Stealer that has been active in the wild since March 2025. This sophisticated malware targets...