Skip to content
InfosecToday.com
  • Cybersecurity Glossary
InfosecToday.com

Vulnerability Exploitation

Red Teams have successfully bypassed GPT-5’s safeguards, cautioning that it has become ‘almost impractical’ for business use.
AI Security  | Vulnerability Exploitation

Red Teams have successfully bypassed GPT-5’s safeguards, cautioning that it has become ‘almost impractical’ for business use.

Chinese cybercriminals are taking advantage of vulnerabilities in SharePoint to launch toolsets that include backdoors, ransomware, and loaders.
Cybersecurity Threats | Malware Development | Vulnerability Exploitation

Chinese cybercriminals are taking advantage of vulnerabilities in SharePoint to launch toolsets that include backdoors, ransomware, and loaders.

A newly discovered vulnerability in Streamlit enables cybercriminals to execute cloud account takeover attacks.
Cloud Security Risks | Financial Data Manipulation  | Vulnerability Exploitation

A newly discovered vulnerability in Streamlit enables cybercriminals to execute cloud account takeover attacks.

Cybercriminals have the ability to access IIS machine keys by taking advantage of a vulnerability in SharePoint’s deserialization process.
Cybersecurity Threats | Remote Code Execution | Vulnerability Exploitation

Cybercriminals have the ability to access IIS machine keys by taking advantage of a vulnerability in SharePoint’s deserialization process.

A vulnerability chain in NVIDIA Triton has the potential to allow attackers to gain control over AI servers.
AI Security Risks  | Remote Code Execution | Vulnerability Exploitation

A vulnerability chain in NVIDIA Triton has the potential to allow attackers to gain control over AI servers.

SonicWall VPNs are being actively targeted due to a zero-day vulnerability that allows attackers to circumvent multi-factor authentication (MFA) and install ransomware.
Cybersecurity Threats | Ransomware Attacks  | Vulnerability Exploitation

SonicWall VPNs are being actively targeted due to a zero-day vulnerability that allows attackers to circumvent multi-factor authentication (MFA) and install ransomware.

Researchers took advantage of kernelCTF instances on Google and a zero-day vulnerability in Debian 12.
Code Auditing  | Kernel Security | Vulnerability Exploitation

Researchers took advantage of kernelCTF instances on Google and a zero-day vulnerability in Debian 12.

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • Cybersecurity Glossary
Search