Information security
fromSecurityWeek
1 hour agoVulnerabilities Allowed Full Compromise of Google Looker Instances
Two Looker vulnerabilities (LookOut) allow attackers with developer permissions to achieve remote code execution, full administrative access, data exfiltration, and potential cross-tenant access.