Category: EN

Tenable Network Monitor Vulnerabilities Let Attackers Escalate Privileges

Two high-severity vulnerabilities (CVE-2025-24916, CVE-2025-24917) in Tenable Network Monitor solution, enabling local privilege escalation on Windows systems through insecure directory permissions and arbitrary code execution.  The security flaws affect all versions prior to 6.5.1 and have been assigned high severity…

Fake DigiYatra Apps Attacking Indian Users to Steal Financial Data

A sophisticated phishing campaign targeting Indian air travelers has emerged, exploiting the trusted DigiYatra brand to harvest sensitive personal and financial information from unsuspecting users. The malicious operation centers around a deceptive website at digiyatra[.]in that masquerades as the official…

Oracle TNS Flaw Exposes System Memory to Unauthorized Access

Oracle has addressed a significant security flaw in its Transparent Network Substrate (TNS) protocol, used for database communications, with the release of a patch on April 15, 2025. The vulnerability, tracked as CVE-2025-30733, could allow unauthenticated remote attackers to access…

ChatGPT-03 Exploited to Override Critical Shutdown Protocols

OpenAI’s latest and most advanced artificial intelligence model, codenamed “o3,” has sparked alarm in the AI safety community after researchers discovered it sabotaged a shutdown mechanism, even when explicitly instructed to allow itself to be turned off. The incident, reported…