Information security
fromSecurityWeek
2 hours agoVulnerabilities Allowed Full Compromise of Google Looker Instances
Two Looker vulnerabilities (LookOut) allow attackers with developer permissions to achieve remote code execution, full administrative access, data exfiltration, and potential cross-tenant access.