Learn Search

Search across all Learn content

SecPod Labs

Security Research

In-depth CVE write-ups, vulnerability analysis, and security intelligence from the SecPod Research team.

Reject, Repeat, Restart: RADIUS Bug Triggers Cisco ISE DoS

CVE Research

Reject, Repeat, Restart: RADIUS Bug Triggers Cisco ISE DoS

A vulnerability in Cisco Identity Services Engine (ISE) could allow remote attackers to trigger unexpected system restarts, leading to a denial-of-service (DoS) condition. The vulnerability stems from how ISE handles repeated authentication failures, and organizations relying on ISE for network acce...

Nov 06, 2025 • 3 min read

Critical Chrome Vulnerabilities Patched: WebGPU and V8 Flaws Fixed in Latest Release

CVE Research

Critical Chrome Vulnerabilities Patched: WebGPU and V8 Flaws Fixed in Latest Release

Google has urgently released a security update for Chrome, addressing multiple vulnerabilities that could allow attackers to execute code remotely on affected systems. The update, version 142.0.7444.134 and 142.0.7444.135, is rolling out across Windows, Mac, and Linux, while Android users will recei...

Nov 06, 2025 • 3 min read

Beyond CVSS: Using MITRE ATT&CK for smarter prioritization

CVE Research

Beyond CVSS: Using MITRE ATT&CK for smarter prioritization

Cloud teams face more findings than available hours. The gap is not detection, it is deciding what deserves action now. A decision-first approach ranks cloud risks using clear outcome levels that turn scattered alerts into a plan shared by operators and leadership. Saner Cloud Security Risk Prioriti...

Nov 06, 2025 • 6 min read

Control Web Panel Breached: Critical RCE Exploited in the Wild

CVE Research

Control Web Panel Breached: Critical RCE Exploited in the Wild

A critical vulnerability has been identified in Control Web Panel (CWP), a widely used web hosting control panel also known as CentOS Web Panel, which is now under active exploitation. The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert regarding this vulnerability, ident...

Nov 05, 2025 • 4 min read

Chrome 142 Released: High-Severity V8 Flaws Fixed, $100K in Rewards Paid

CVE Research

Chrome 142 Released: High-Severity V8 Flaws Fixed, $100K in Rewards Paid

Google has released Chrome 142, addressing a total of 20 security flaws, including two high-severity vulnerabilities affecting the V8 JavaScript engine. The company awarded a total of $100,000 in bug bounties to researchers who reported these critical issues.

Nov 04, 2025 • 3 min read

Under UNC6384’s LNK: CVE-2025-9491 Powers PlugX Espionage Attacks

CVE Research

Under UNC6384’s LNK: CVE-2025-9491 Powers PlugX Espionage Attacks

A Windows LNK (shortcut) UI-misrepresentation vulnerability (CVE-2025-9491, ZDI-CAN-25373) is being actively exploited by a China-linked threat actor tracked as UNC6384 to deliver the PlugX Remote Access Trojan (RAT) against European diplomatic and government targets. The flaw enables malicious .LNK...

Nov 04, 2025 • 5 min read

RDSEED Vulnerability in AMD Zen 5: A Threat to Hardware Randomness Integrity

CVE Research

RDSEED Vulnerability in AMD Zen 5: A Threat to Hardware Randomness Integrity

AMD has confirmed a significant flaw in the RDSEED instruction used for hardware-level random number generation on Zen 5 CPUs. The vulnerability, cataloged as AMD-SB-7055 and assigned CVE-2025-62626, can cause the 16-bit and 32-bit RDSEED variants to return zero instead of genuine entropy, which sof...

Nov 03, 2025 • 4 min read

BadCandy: Stealth Implant Converts IOS XE into a Persistent Surveillance Node

CVE Research

BadCandy: Stealth Implant Converts IOS XE into a Persistent Surveillance Node

Cybercriminals and advanced persistent threat (APT) actors continue to evolve toward stealthier, persistence-focused, and profit-driven operations. Recent intelligence reports reveal a coordinated exploitation campaign combining high-severity vulnerabilities—the Cisco IOS XE privilege escalation fla...

Nov 03, 2025 • 5 min read

Breaking the Kernel: How Hackers Can Gain Root Access on Ubuntu

CVE Research

Breaking the Kernel: How Hackers Can Gain Root Access on Ubuntu

A critical vulnerability has been discovered in Ubuntu’s Linux kernel, potentially allowing local attackers to escalate their privileges and gain root access on vulnerable systems. This flaw stems from a reference count imbalance within the af_unix subsystem, leading to a use-after-free (UAF) condit...

Oct 28, 2025 • 3 min read