In a recent blog post, Microsoft highlighted the alarming tactics employed by a threat actor known as Storm-1175. This group has shown a remarkable shift in their attack methodologies, moving beyond the typical usage of N-day vulnerabilities. Instead, they have increasingly leveraged zero-day exploits,...
A team of AI-driven vulnerability hunters, led by security researcher Asim Viladi Oglu Manizada, has identified two significant security vulnerabilities in the Common Unix Printing System (CUPS), which serves as the standard printing system for a variety of Linux and Unix-like operating systems. These...