Information securityfromThe Hacker News1 month agoExperts Uncover Four New Privilege Escalation Flaws in Windows Task SchedulerWindows task scheduling service has multiple vulnerabilities allowing local privilege escalation and log erasure.
Information securityfromThe Hacker News23 hours agoAWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service ExploitationDefault IAM roles in AWS can be exploited, enabling privilege escalation and account compromise due to overly broad permissions.
fromThe Hacker News4 weeks agoPrivacy professionalsGCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages
Information securityfromThe Hacker News1 month agoExperts Uncover Four New Privilege Escalation Flaws in Windows Task SchedulerWindows task scheduling service has multiple vulnerabilities allowing local privilege escalation and log erasure.
Information securityfromThe Hacker News23 hours agoAWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service ExploitationDefault IAM roles in AWS can be exploited, enabling privilege escalation and account compromise due to overly broad permissions.
fromThe Hacker News4 weeks agoPrivacy professionalsGCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages
Information securityfromThe Hacker News9 months agoResearchers Reveal ConfusedFunction Vulnerability in Google Cloud PlatformA vulnerability named ConfusedFunction allows attackers to escalate privileges in Google Cloud Functions and access unauthorized data.Google has updated Cloud Build to prevent misuse post-responsible disclosure.