Learn Search

Search across all Learn content

SecPod Labs

Security Research

In-depth CVE write-ups, vulnerability analysis, and security intelligence from the SecPod Research team.

FortiSIEM Vulnerability CVE-2025-25256: Unauthenticated OS Command Injection Now Active

CVE Research

FortiSIEM Vulnerability CVE-2025-25256: Unauthenticated OS Command Injection Now Active

Fortinet has issued a critical security advisory regarding a high-severity vulnerability in its FortiSIEM platform, identified as CVE-2025-25256. This flaw, which has a CVSS score of 9.8, is a remote, unauthenticated command injection vulnerability that can allow attackers to execute unauthorized co...

Aug 13, 2025 • 3 min read

Zero Trust Under Fire: Critical Flaws Expose Check Point, Zscaler, and Netskope Users

CVE Research

Zero Trust Under Fire: Critical Flaws Expose Check Point, Zscaler, and Netskope Users

Security researchers have uncovered critical vulnerabilities in leading Zero Trust Network Access (ZTNA) solutions from major cybersecurity vendors, including Zscaler, Netskope, and Check Point. These findings, presented at DEF CON 33 in Las Vegas, highlight potential authentication bypasses, privil...

Aug 12, 2025 • 4 min read

107 Flaws Fixed, One Zero Day In Microsoft’s August 2025 Patch Tuesday

CVE Research

107 Flaws Fixed, One Zero Day In Microsoft’s August 2025 Patch Tuesday

August’s Patch Tuesday has arrived! This month, Microsoft has released patches for 107 flaws, including 13 critical bugs and one zero-day.

Aug 12, 2025 • 4 min read

WinRAR CVE-2025-8088: RomCom’s Doorway to Remote Code Execution

CVE Research

WinRAR CVE-2025-8088: RomCom’s Doorway to Remote Code Execution

A critical vulnerability in WinRAR, identified as CVE-2025-8088, was exploited as a zero-day in targeted phishing attacks to deploy RomCom backdoors. This flaw, a directory traversal vulnerability, allows attackers to craft malicious archives that place executable files in Windows Startup folders, e...

Aug 11, 2025 • 5 min read

15000 Jenkins Servers Exposed to Unauthenticated RCE Attack

CVE Research

15000 Jenkins Servers Exposed to Unauthenticated RCE Attack

A recently identified command injection vulnerability, CVE-2025-53652, in the Jenkins Git Parameter plugin puts approximately 15,000 Jenkins servers at risk of remote code execution (RCE). This flaw could allow attackers to compromise unauthenticated Jenkins servers, potentially leading to significa...

Aug 10, 2025 • 3 min read

Retbleed Reloaded: New Exploit Pierces CPU Memory Defenses

CVE Research

Retbleed Reloaded: New Exploit Pierces CPU Memory Defenses

Security researchers have recently demonstrated a significantly improved exploit for the Retbleed CPU vulnerability, highlighting the ongoing risks posed by speculative execution flaws in modern processors. This exploit allows attackers to read arbitrary memory from affected systems, bypassing secur...

Aug 10, 2025 • 3 min read

Dangerous Linux Kernel Exploit Targets Chrome Users for Full Control

CVE Research

Dangerous Linux Kernel Exploit Targets Chrome Users for Full Control

Executive SummaryA critical vulnerability in the Linux kernel, identified as CVE-2025-38236, enables attackers to escalate privileges from the Chrome renderer sandbox to full kernel-level control on affected Linux systems. Immediate patching is essential, as successful exploitation grants attackers...

Aug 10, 2025 • 3 min read

Ghost Calls: Stealthy C2 Attack Exploits Zoom, Teams, and Meet

CVE Research

Ghost Calls: Stealthy C2 Attack Exploits Zoom, Teams, and Meet

A novel attack technique dubbed “Ghost Calls” has emerged, exploiting web conferencing platforms like Zoom, Microsoft Teams, and Google Meet to create covert command and control (C2) channels. This sophisticated method allows attackers to bypass traditional network security measures, making it a sig...

Aug 10, 2025 • 3 min read

HTTP/1.1 Vulnerability: A Looming Threat to Millions of Websites

CVE Research

HTTP/1.1 Vulnerability: A Looming Threat to Millions of Websites

A fundamental vulnerability within the HTTP/1.1 protocol poses a significant threat to millions of websites, potentially allowing attackers to execute hostile takeovers through sophisticated request smuggling attacks. This flaw, rooted in the protocol’s design, creates ambiguity in request boundarie...

Aug 07, 2025 • 4 min read