A newly disclosed vulnerability in a Linux program can be exploited for local privilege escalation — and ultimately to acquire root privileges, researchers at cybersecurity vendor Qualys said today.
A missing check allows unprivileged attackers to escape containers and execute arbitrary commands in the kernel. To go along with the “Dirty Pipe” Linux security bug coming to light, two researchers ...
Two vulnerabilities in the way the Linux kernel handles the conversion of specific data types could allow a malicious user to turn a local, unprivileged user account into a superuser account with root ...
It seems that cybersecurity concerns are once again on the rise, as just this week, we reported on the surge in ransomware attacks. Now, researchers at Qualys have published a privilege escalation ...
Chrome CVE-2026-0628 let malicious extensions hijack Gemini panel for privilege escalation, local file access, and ...
A seven-year-old local privilege escalation bug has reared its head and finally got a fix. When it was available, exploiting the vulnerability in the polkit authentication service could have allowed ...
Overview On February 11, 2026, NSFOCUS CERT monitored Microsoft’s release of its February security update patches, addressing 59 security issues across widely used products such as Windows, Azure, ...
Researchers found an easy-to-exploit vulnerability in Snap, a universal application packaging and distribution system developed for Ubuntu but available on multiple Linux distributions. The flaw ...
Slovak cybersecurity company ESET says a newly patched zero-day vulnerability in the Windows Win32 Kernel Subsystem has been exploited in attacks since March 2023. The February 2025 Android security ...