Critical RCE in Ninja Forms File Upload Exposes ~50,000 WordPress Sites

Critical RCE in Ninja Forms File Upload Exposes ~50,000 WordPress Sites

A recently disclosed vulnerability in the popular Ninja Forms “File Upload” addon has placed roughly 50,000 WordPress sites at risk of full takeover. Tracked as CVE-2026-0740 and carrying a CVSS score of 9.8, the flaw allows unauthenticated arbitrary file uploads — a straightforward path to remote code execution (RCE) for attackers. Site owners who rely on the affected plugin must

Researcher Publishes Windows Defender 0-Day ‘BlueHammer’ LPE Proof‑of‑Concept

Researcher Publishes Windows Defender 0-Day ‘BlueHammer’ LPE Proof‑of‑Concept

A security researcher using the handle Chaotic Eclipse has publicly released a working proof‑of‑concept for a Windows zero‑day local privilege escalation (LPE) exploit called “BlueHammer.” The disclosure, accompanied by full source code on GitHub, was confirmed as functional by vulnerability researcher Will Dormann and demonstrates that a low‑privileged local user can escalate to NT AUTHORITYSYSTEM on affected machines. The release

Announcing General Availability of Server Logic in Power Pages

Announcing General Availability of Server Logic in Power Pages

Power Pages has taken a significant step forward: Server Logic is now generally available for production use. What began as a preview capability to bring server-side processing closer to makers and developers has matured into a production-ready feature designed for enterprise scenarios. With this GA release, organizations gain a native, governed, and extensible way to run server-side operations directly within

Oracle Issues Urgent Security Update for Critical RCE in Identity Manager and Web Services Manager

Oracle Issues Urgent Security Update for Critical RCE in Identity Manager and Web Services Manager

Oracle has released an out-of-band security alert to address a critical remote code execution vulnerability, tracked as CVE-2026-21992, affecting Oracle Identity Manager and Oracle Web Services Manager. With a CVSS 3.1 base score of 9.8 and no authentication required, this is a high-risk flaw that can be exploited remotely over HTTP with minimal complexity. Organizations running internet-facing Fusion Middleware components

Chrome Security Update Fixes 26 Vulnerabilities That Could Allow Remote Code Execution

Chrome Security Update Fixes 26 Vulnerabilities That Could Allow Remote Code Execution

Google’s latest Chrome security update is a reminder that even the world’s most scrutinized software still harbors dangerous flaws. In a single release, Chrome developers patched 26 vulnerabilities—three marked critical—that could let unauthenticated attackers run malicious code simply by getting a user to visit a crafted webpage. For anyone who uses Chrome, from casual browsers to enterprise fleets, this is

OpenAI’s GPT-5.4 Mini and Nano: Speed-First Models for Real-Time Workflows

OpenAI’s GPT-5.4 Mini and Nano: Speed-First Models for Real-Time Workflows

OpenAI’s latest release—GPT-5.4 Mini and GPT-5.4 Nano—marks a clear shift in focus from sheer size to practical responsiveness. These smaller variants are engineered to deliver answers far faster than their flagship counterparts while still preserving strong reasoning, coding, and multimodal skills. For teams building latency-sensitive applications—interactive coding assistants, real-time UI automation, and high-throughput data pipelines—these models promise a meaningful performance-per-cost