Recent Blog Posts

Lorem Ipsum has been the industry's standard dummy text.

Showing posts from January, 2026Show all
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories
Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution
Password Reuse in Disguise: An Often-Missed Risky Workaround
WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
CTEM in Practice: Prioritization, Validation, and Outcomes That Matter
Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation
Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware
âš¡ Weekly Recap: Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More
Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers
Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls
Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access
Filling the Most Common Gaps in Google Workspace Security
Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts
Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
Exposure Assessment Platforms Signal a Shift in Focus
LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords
Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers
Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion
How Servers Get Hacked and Practical Methods to Prevent Attacks
âš¡ Weekly Recap: Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More
DevOps & SaaS Downtime: The High (and Hidden) Costs for Cloud-First Businesses
Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations
Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
GootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection
Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts
Your Digital Footprint Can Lead Right to Your Front Door
Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
Model Security Is the Wrong Frame – The Real Risk Is Workflow Security
Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud
Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware
New Research: 64% of 3rd-Party Applications Access Sensitive Data Without Justification
What Should We Learn From How Attackers Leveraged AI in 2025?
CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution
âš¡ Weekly Recap: AI Automation Exploits, Telecom Espionage, Prompt Poaching & More
GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials
Anthropic Launches Claude AI for Healthcare with Secure Health Record Access
MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
Cybersecurity Predictions 2026: The Hype We Can Ignore (And the Risks We Can't)
China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
ThreatsDay Bulletin: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories