9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors

Ravie LakshmananMar 18, 2026Network Security / Vulnerability Cybersecurity researchers have warned about the risks posed by low-cost IP KVM (Keyboard, Video, Mouse over Internet Protocol) devices, which can grant attackers extensive control over compromised hosts. The nine vulnerabilities, discovered by Eclypsium, span four different products from GL-iNet Comet RM-1, Angeet/Yeeso ES3 KVM, Sipeed NanoKVM, and […]

Continue Reading

How the red-hot AI data center boom is igniting demand for a new, lucrative career path: trade workers

Demand for new AI data centers is surging, but they can’t build themselves. Big Tech is funneling billions into building out these specialized facilities, with the four hyperscalers, Alphabet, Microsoft, Meta, and Amazon, committing nearly $700 billion in combined capex spending this year to fund these developments. Amazon said last month that it’s committing $12 […]

Continue Reading

Marshall Bromley 450 Launched in India With 360-Degree Sound, Up to 40-Hour Battery Life: Price, Features

Marshall has launched the Bromley 450 party speaker in India, priced at Rs. 74,999. The portable Bluetooth speaker offers 360-degree sound, integrated stage lights, and support for microphone and instrument inputs. It features multiple drivers, Class D amplifiers, and supports Bluetooth 5.3 with Auracast. The speaker includes a replaceable LFP battery with over 40 hou…

Continue Reading

Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE

Ravie LakshmananMar 18, 2026Vulnerability / Data Protection Cybersecurity researchers have disclosed a critical security flaw impacting the GNU InetUtils telnet daemon (telnetd) that could be exploited by an unauthenticated remote attacker to execute arbitrary code with elevated privileges. The vulnerability, tracked as CVE-2026-32746, carries a CVSS score of 9.8 out of 10.0. It has been […]

Continue Reading

Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels

Security teams today are not short on tools or data. They are overwhelmed by both.  Yet within the terabytes of alerts, exposures, and misconfigurations – security teams still struggle to understand context:  Q: Which exposures, misconfigurations, and vulnerabilities chain together to create viable attack paths to crown jewels? Even the most mature security teams can’t […]

Continue Reading

Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit

Ravie LakshmananMar 18, 2026Linux / Endpoint Security A high-severity security flaw affecting default installations of Ubuntu Desktop versions 24.04 and later could be exploited to escalate privileges to the root level. Tracked as CVE-2026-3888 (CVSS score: 7.8), the issue could allow an attacker to seize control of a susceptible system. “This flaw (CVE-2026-3888) allows an […]

Continue Reading

Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS

Ravie LakshmananMar 18, 2026Vulnerability / Zero-Day Apple on Tuesday released its first round of Background Security Improvements to address a security flaw in WebKit that affects iOS, iPadOS, and macOS. The vulnerability, tracked as CVE-2026-20643 (CVSS score: N/A), has been described as a cross-origin issue in WebKit’s Navigation API that could be exploited to bypass […]

Continue Reading