$100K Paid Out for Google Cloud Shell Root Compromise

A Dutch researcher claimed Google’s very first annual Cloud Platform bug-bounty prize, for a clever container escape exploit. Continue reading $100K Paid Out for Google Cloud Shell Root Compromise

MediaTek Bug Actively Exploited, Affects Millions of Android Devices

An exploit published by a developer is easy to use and has already been used to build malicious apps that gain root access on Android devices. Continue reading MediaTek Bug Actively Exploited, Affects Millions of Android Devices

Sudo Flaw Lets Linux Users Run Commands As Root Even When They’re Restricted

Attention Linux Users!

A new vulnerability has been discovered in Sudo—one of the most important, powerful, and commonly used utilities that comes as a core command installed on almost every UNIX and Linux-based operating system.

The vulnerability in… Continue reading Sudo Flaw Lets Linux Users Run Commands As Root Even When They’re Restricted

Drupal Patches Highly Critical Remote Code Execution Vulnerability

Websites based on the Drupal content management system might be affected by a highly critical vulnerability that could result in remote code execution. The vulnerability affects websites running Drupal 8 with RESTful Web Services (rest) module enabled… Continue reading Drupal Patches Highly Critical Remote Code Execution Vulnerability