Active exploitation of BeyondTrust enables unauthenticated RCE as CISA adds Apple, Microsoft, SolarWinds, and Notepad++ flaws to KEV list.
A critical pre-authentication remote code execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access ...
A member of the Crazy ransomware gang is abusing legitimate employee monitoring software and the SimpleHelp remote support ...
Tenable Research disclosed two critical security vulnerabilities in Google Looker that could allow attackers to hijack systems or access corporate data across more than 60,000 companies using the ...
Two vulnerabilities can be exploited to fully compromise instances of the Google Looker business intelligence platform.
Attackers could even have used one vulnerable Lookout user to gain access to other Google Cloud tenants' environments.