Security Intelligence
Threat actors exploit security-testing apps to breach cloud infrastructure
Threat actors are exploiting intentionally vulnerable security testing apps deployed in real cloud environments,...
Security Intelligence
Threat actors are exploiting intentionally vulnerable security testing apps deployed in real cloud environments,...
Security Intelligence
Threat actors are abusing trusted Visual Studio Code workflows, using social engineering and malicious repositories to...
Security Intelligence
CIRO’s August 2025 breach exposed investor data after a phishing attack. This analysis explores the incident and the...
Security Intelligence
New research shows China-aligned threat actors abusing zero-days and stolen credentials to gain persistent access to...
Security Intelligence
Leaked documents reveal how Chinese contractor Knownsec supports state-aligned cyber espionage through large-scale...
Security Intelligence
Two critical Fortinet vulnerabilities in FortiSIEM and FortiFone enable unauthenticated exploitation when exposed...
Security Intelligence
MuddyWater is using a new Rust-based malware, RustyWater, delivered via malicious Word documents. Learn how to detect,...
Security Intelligence
A critical RCE vulnerability in Trend Micro Apex Central enables SYSTEM-level compromise. Public PoC increases risk;...
Security Intelligence
Veeam has patched multiple vulnerabilities in Backup & Replication that enable authenticated RCE. Learn who’s affected,...
Security Intelligence
CVE-2026-21858 is a critical n8n vulnerability enabling unauthenticated remote code execution, continuing a recent wave...
Security Intelligence
A critical vulnerability (CVE-2026-0625) in legacy D-Link DSL routers enables unauthenticated remote code execution....
Security Intelligence
A critical SmarterMail vulnerability puts unpatched, internet-facing mail servers at risk. See mitigation steps and...