A critical vulnerability, tracked as CVE-2024-33352, has been identified in BlueStacks, a widely used Android emulator and cloud gaming platform developed by BlueStacks, Inc. This flaw poses a significant security risk by allowing attackers to gain full control over a victim's machine. The issue affects BlueStacks App Player, which is used to run Android applications on Windows and macOS systems. The vulnerability is linked to how BlueStacks handles virtual machine configuration files, which are stored in a directory that is writable by all users. This misconfiguration allows unauthorized users to alter the virtual machine image by inserting executable code that runs each time the emulator starts. Exploiting this vulnerability enables attackers to insert malicious code into the Android virtual machine, potentially leading to privilege escalation. The attackers can manipulate the emulator’s settings to expand their access beyond the virtual environment, potentially compromising the host operating system’s entire C drive. The implications are severe: attackers could embed malicious software within the Android VM that activates upon system restart, giving them complete control over the victim’s computer. This vulnerability, disclosed by researcher Maciej Miszczyk, impacts BlueStacks versions earlier than 10.40.1000.502 on Windows systems. It is crucial for users and administrators to upgrade to the latest patched version immediately to protect against these risks and ensure system security.
CVE-2026-0227 is a high-severity denial-of-service (DoS) vulnerability affecting Palo Alto Networks PAN-OS and Prisma Access deployments where the GlobalProtect gateway or portal i...
In January 2026, South Korean conglomerate Kyowon Group disclosed a ransomware incident that disrupted internal systems and services across multiple affiliates. The attack was iden...
A critical authentication bypass vulnerability was discovered in Cal.com, an open-source scheduling and appointment management platform. The flaw allows attackers to gain unauthori...