Information security
fromTheregister
4 hours agoMicrosoft patch fell short. New Windows flaw exploited
Attackers exploit a zero-click Windows flaw, CVE-2026-32202, exposing sensitive information on vulnerable systems.
"In the most severe cases, SQL injection vulnerabilities combined with modest database privileges could have led to full database compromise, PHI exfiltration at scale, and remote code execution on the server."
Security guards and law enforcement personnel are usually the first professionals to provide help in a public emergency and as a result, also experience some of the highest rates of workplace violence in any occupation.
Current evidence indicates that this data originated from Checkmarx's GitHub repositories, and that access to those repositories was facilitated through the initial supply chain attack of March 23, 2023.
CrowdStrike published an advisory for CVE-2026-40050, a critical unauthenticated path traversal vulnerability affecting its LogScale product. The flaw can allow a remote attacker to read arbitrary files from the server filesystem.
A Common Vulnerability Exposure (CVE) that cannot reach the privilege plane is operationally ineffective - even at a CVSS Score of 10. This should be a core philosophy that is embedded into the fabric of software engineering.
"Use-after-free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page."