Vulnerabilities
Researchers have identified three high-risk vulnerabilities in Claude.ai. These enable an end-to-end attack chain that exfiltrates sensitive information without the user's knowledge. A legitimate Google ad could trigger data exfiltration.
Rapportert av AI
A new analysis of 20 years of Linux kernel development reveals that bugs often remain undetected for years, with an average lifespan of 2.1 years before discovery. The research, conducted by Pebblebed's Jenny Guanni Qu, highlights variations across kernel components and the prevalence of incomplete fixes. Some vulnerabilities persisted for over two decades.
The U.S. Cybersecurity and Infrastructure Security Agency has added vulnerabilities from Oracle, Mozilla, Microsoft Windows, Linux Kernel, and Microsoft Internet Explorer to its Known Exploited Vulnerabilities catalog. This action requires federal agencies to address these flaws by October 27, 2025, to mitigate risks from ongoing exploits. Among the additions is a critical Oracle vulnerability recently patched after exploitation by ransomware actors.