A recent investigation by Trend Micro’s Managed XDR team uncovered a sophisticated web shell attack targeting Internet...
News
The advanced persistent threat (APT) group Earth Preta, also known as Mustang Panda, has refined its evasion...
Vercel has resolved a significant security flaw in Next.js middleware authentication, which could have allowed attackers to...
NetApp has resolved a critical privilege escalation vulnerability (NCSC-2025-0097) in its SnapCenter backup management platform, which could...
A newly disclosed critical vulnerability (CVE-2025-1097) in Kubernetes’ Ingress-Nginx controller enables attackers to execute arbitrary code and...
A newly discovered high-severity vulnerability (CVE-2025-1098) in Kubernetes’ Ingress-Nginx controller allows attackers to execute arbitrary code and...
A critical security vulnerability (CVE-2025-1974) in Kubernetes’ ingress-nginx controller has been disclosed, allowing unauthenticated attackers with pod...
A newly disclosed high-severity vulnerability (CVE-2025-24514) in Kubernetes’ ingress-nginx controller enables attackers to execute arbitrary code and...
A newly discovered critical vulnerability (CVE-2025-2726) affecting multiple H3C Magic series routers allows remote attackers to execute...
A critical command injection vulnerability (CVE-2025-2728) affecting H3C Magic NX30 Pro and NX400 routers has been identified,...
A critical security vulnerability (CVE-2025-2727) has been identified in H3C Magic NX30 Pro routers running firmware versions...
A critical vulnerability (CVE-2025-2729) has been identified in multiple H3C Magic series routers, exposing them to remote...
A critical security vulnerability affecting multiple H3C Magic series routers has been identified, allowing remote attackers to...
PIP-INTEL is a Python-based Open Source Intelligence (OSINT) tool designed to streamline reconnaissance and threat intelligence workflows...
Security teams now have access to a powerful new open-source tool for analyzing binary security posture. Extrude...
VulnNodeApp serves as an intentionally vulnerable Node.js application specifically designed for security education and training purposes. This...
Ashok has emerged as a powerful open-source OSINT reconnaissance tool that consolidates multiple information-gathering capabilities into a...
A new open-source security tool called ModTracer provides critical visibility into Linux Kernel Module (LKM) rootkits that...
A new tool called Imperius has emerged, designed to detect and expose Linux Kernel Module (LKM) rootkits...
Mass-Assigner is a newly released open-source security tool that helps organizations identify mass assignment vulnerabilities in web...