Skip to content
SecureLayer7
  • Home
  • Services
    • PENETRATION TESTING
      • Application Security
      • Mobile Application Security
      • Thick Client Penetration Testing
      • VoIP Penetration Testing
      • On Demand Penetration Testing
      • CODE AUDIT
      • Ethereum Smart Contract Audit
      • Source Code Audit
    • SECURITY EXPERTISE
      • IoT Device Security
      • ICO Security
      • Web Malware Removal
      • SAP Security Assessment
      • Red Team Assessment
      • CLOUD INFRASTRUCTURE
      • AWS Security Assessment
    • INFRASTRUCTURE SECURITY
      • Network Security
      • Server Hardening
      • Wireless Security Assessment
      • Firewall Configuration Review
      • Telecom Network Security
  • Resources
    • Resources
    • Advisories
  • Company
    • About
    • Management
    • Careers
  • Contact Us

Category: News

Stay tuned with SecureLayer7 Announcements

Category Archive
ClawdBot VS Code Trojan Analysis and OpenClaw Security Risks

ClawdBot VS Code Trojan Analysis and OpenClaw Security Risks

Vikas Kumar · March 6, 2026 · 12 min read

On January 27, 2026, Aikido Security flagged a VS Code extension called “ClawdBot Agent” — a fully functional AI coding assistant that silently drops a ScreenConnect Remote Access Tool (RAT)…

Read More
IPVanish VPN macOS Privilege Escalation – SecureLayer7

IPVanish VPN macOS Privilege Escalation – SecureLayer7

shubham Patil · March 2, 2026 · 41 min read

The IPVanish VPN application for macOS contains a critical privilege escalation vulnerability that allows any unprivileged local process to execute arbitrary code as root without user interaction. The attack vector…

Read More
DeepChat openExternal RCE via XSS in Electron

DeepChat openExternal RCE via XSS in Electron

shubham Patil · March 2, 2026 · 12 min read

A Critical-severity Unsafe Protocol Handling flaw affecting DeepChat, a popular open-source Electron-based AI chat desktop application. The issue resides in the application’s preload script at src/preload/index.ts, specifically in the openExternal…

Read More
A Deep Dive into CVE-2026-25049: n8n Remote Code Execution

A Deep Dive into CVE-2026-25049: n8n Remote Code Execution

· February 4, 2026 · 17 min read

We discovered a critical vulnerability in n8n, a widely used workflow automation platform, that enables arbitrary command execution on the underlying server. The severity comes from how easily it can…

Read More
XWiki Critical Vulnerabilities: Complete Security Analysis 2025

XWiki Critical Vulnerabilities: Complete Security Analysis 2025

· January 6, 2026 · 49 min read

In November 2025, SOC teams around the world started noticing something strange. Servers running XWiki, widely used for internal documentation and collaboration, were suddenly maxing out CPU usage. Systems were…

Read More
n8n CVE-2025-68613 RCE Exploitation: A Detailed Guide  

n8n CVE-2025-68613 RCE Exploitation: A Detailed Guide  

· December 21, 2025 · 13 min read

A critical flaw (CVE-2025-68613, CVSS 9.9) in n8n allows remote code execution through expression injection, risking full system compromise and requiring immediate patching. 

Read More
CVE-2025-55182: Understanding React’s Critical Prototype Pollution Vulnerability

CVE-2025-55182: Understanding React’s Critical Prototype Pollution Vulnerability

· December 5, 2025 · 19 min read

Two new vulnerabilities in React and Next.js,  have exposed a critical weakness in the React Server Components’ (RSC) “Flight” protocol. These vulnerabilities, known as CVE-2025-55182 and its corresponding vulnerability in…

Read More
Anthropic AI Misuse by Chinese Hackers: How to Defend LLMs

Anthropic AI Misuse by Chinese Hackers: How to Defend LLMs

· December 2, 2025 · 8 min read

The misuse of Anthropic’s Claude AI by a suspected Chinese threat group is a clear indication of what an agentic model can do. Even with limited details released so far,…

Read More
R.U.D.Y. Attack: An In-depth Look

R.U.D.Y. Attack: An In-depth Look

· November 20, 2025 · 10 min read

In the evolving landscape of cybersecurity threats, some of the most dangerous attacks are not the loudest or most dramatic – they are the ones that fly under the radar.…

Read More
OSI Model: 7 Layers, Key Functions, Security Risks & Attacks

OSI Model: 7 Layers, Key Functions, Security Risks & Attacks

· November 20, 2025 · 12 min read

Every digital activity, whether sending an email, participating in a video call, or making an online purchase, involves the movement of data from one system to another. This process follows…

Read More

Posts pagination

Page 1 Page 2 Page 3 … Page 18 Next »

Recent Posts

  • ClawdBot VS Code Trojan Analysis and OpenClaw Security Risks
  • IPVanish VPN macOS Privilege Escalation – SecureLayer7
  • DeepChat openExternal RCE via XSS in Electron
  • OWASP A03: Software Supply Chain Failures Explained
  • A Deep Dive into CVE-2026-25049: n8n Remote Code Execution

Topics

  • Penetration Testing
  • Cybersecurity
  • Offensive Security
  • Web Application Security
  • API Security
  • Cloud Security
  • OWASP
  • Security Advisories
  • CVE Research
  • Knowledge Base
  • News

Quick Links

  • Home
  • About
  • Blog
  • Contact Us

About SecureLayer7

Leading offensive security firm offering penetration testing, API security scanning, and attack surface management. Learn more →

Services

  • Application Security
  • Network Security
  • Mobile Application Security
  • Thick Client Security

Security Topics

  • Penetration Testing
  • Offensive Security
  • Web Application Security
  • API Security
  • Cloud Security
  • OWASP
  • CVE Research
  • Security Advisories

Security Expertise

  • IoT Device Security
  • Red Teaming Assessment
  • VoIP Penetration Testing

Latest Articles

  • ClawdBot VS Code Trojan Analysis and OpenClaw Security Risks
  • IPVanish VPN macOS Privilege Escalation – SecureLayer7
  • DeepChat openExternal RCE via XSS in Electron
  • OWASP A03: Software Supply Chain Failures Explained

© 2026 SecureLayer7 – Offensive Security, API Scanner & Attack Surface Management — All rights reserved.