|
You are here |
www.huntress.com | ||
| | | | |
www.welivesecurity.com
|
|
| | | | | ESET researchers identified a malicious PDF sample that revealed that the sample exploited two unknown vulnerabilities, a remote-code execution vulnerability in Adobe Reader and a privilege escalation vulnerability in Microsoft Windows, that when combined became extremely powerful. | |
| | | | |
www.thezdi.com
|
|
| | | | | ||
| | | | |
www.cybereason.com
|
|
| | | | | A critical, unauthenticated remote code execution vulnerability, tracked as CVE-2025-32433, have been discovered in Erlang/OTP's SSH implementation. | |
| | | | |
www.p1sec.com
|
|
| | | GTP-U powers user data transport in mobile networks, but poor security practices can expose operators to interception, spoofing, and denial-of-service attacks. Learn how attackers exploit GTP-U and why it remains a critical target in telecom security. | ||