Resource Type: Resource Post

Black Hat key takeaways

Our team shares key takeaways from Black Hat 2025, including why foundational security practices, AI governance, and insider threat management are more critical than ever for building resilience and aligning…
Read more

Sudo host option elevation of privilege

Stratascale's Cybersecurity Research Unit (CRU) uncovered a local privilege escalation vulnerability in Sudo (CVE-2025-32462). By exploiting the host option, attackers can gain root access on affected Linux systems. A patch…
Read more

Sudo chroot elevation of privilege

Stratascale’s Cybersecurity Research Unit (CRU) has identified a critical local privilege escalation vulnerability in Sudo (CVE-2025-32463). This flaw, tied to the chroot feature, allows any local unprivileged user to gain…
Read more

The power of CTEM & how to take advantage of it

Traditional security tools and annual pentests can’t keep up. Continuous Threat Exposure Management (CTEM) delivers real-time visibility and risk-based prioritization to outpace attackers. Learn how CTEM turns reactive security into…
Read more

Ubuntu apport insecure file permissions

Stratascale’s Cybersecurity Research Unit (CRU) discovered an information disclosure vulnerability in Ubuntu’s Apport crash reporting system (CVE-2025-5467). Improper file permissions allowed users in the same group to access sensitive crash…
Read more