Vulnerabilities

Fuatilia

Researchers have identified three high-risk vulnerabilities in Claude.ai. These enable an end-to-end attack chain that exfiltrates sensitive information without the user's knowledge. A legitimate Google ad could trigger data exfiltration.

Imeripotiwa na AI

A new analysis of 20 years of Linux kernel development reveals that bugs often remain undetected for years, with an average lifespan of 2.1 years before discovery. The research, conducted by Pebblebed's Jenny Guanni Qu, highlights variations across kernel components and the prevalence of incomplete fixes. Some vulnerabilities persisted for over two decades.

The U.S. Cybersecurity and Infrastructure Security Agency has added vulnerabilities from Oracle, Mozilla, Microsoft Windows, Linux Kernel, and Microsoft Internet Explorer to its Known Exploited Vulnerabilities catalog. This action requires federal agencies to address these flaws by October 27, 2025, to mitigate risks from ongoing exploits. Among the additions is a critical Oracle vulnerability recently patched after exploitation by ransomware actors.

Jumamosi, 20. Mwezi wa kumi na mbili 2025, 09:12:44

Researchers investigate executable stack issues in Linux systems

Alhamisi, 27. Mwezi wa kumi na moja 2025, 13:12:32

Fluent Bit vulnerabilities risk billions of cloud containers

Ijumaa, 31. Mwezi wa kumi 2025, 15:38:05

Two windows vulnerabilities face active exploitation

Jumatatu, 27. Mwezi wa kumi 2025, 08:30:06

Millions of attacks exploit old WordPress vulnerabilities

Jumamosi, 25. Mwezi wa kumi 2025, 04:57:58

Canonical issues Ubuntu security updates for key vulnerabilities

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa