Security teams now have access to a powerful new open-source tool for analyzing binary security posture. Extrude...
Enterprise Security
A new open-source security tool called ModTracer provides critical visibility into Linux Kernel Module (LKM) rootkits that...
Mobile applications have become central to daily operations, from banking transactions to enterprise communications. However, this reliance...
Internal and external penetration testing (pentesting) are critical components for evaluating an organization’s security posture. These simulated...
In an era of evolving cyber threats, organizations are adopting realistic methods to test their defenses. Red...
Cybercriminals are exploiting macOS’s push notification system to distribute fake alerts mimicking legitimate system warnings. These malicious...
Artificial Intelligence is transforming PowerShell scripting by introducing GitHub Copilot, a powerful tool powered by OpenAI’s GPT-4....
When integrating applications with Microsoft Azure, administrators may encounter the error “AADSTS700054: response_type ‘id_token’ is not enabled...
Large Language Models (LLMs) are increasingly integrated into enterprise workflows, but a new attack vector—ASCII smuggling—exploits Unicode’s...
Check Point Research has uncovered a sophisticated phishing campaign leveraging Google Firebase to host fraudulent pages mimicking...
ESET Research has uncovered a series of cyberespionage campaigns conducted by the advanced persistent threat (APT) group...
Zoho Corporation has addressed a medium-severity authentication vulnerability (CVE-2025-1723) in ManageEngine ADSelfService Plus versions 6510 and earlier....
A recent study by Acronis Threat Research Unit reveals critical security gaps in Microsoft 365 backup data,...
IBM has recently addressed a critical vulnerability in its IBM InfoSphere Information Server 11.7, as detailed in...
The Nationaal Cyber Security Centrum (NCSC) of the Netherlands has issued a warning regarding a series of cyberattacks...
The SolarWinds Orion compromise, disclosed in December 2020, remains one of the most significant cybersecurity incidents in...
Lateral movement is a technique used by attackers to navigate through a network after gaining initial access....
A critical privilege escalation vulnerability, CVE-2025-0628, has been identified in the BerriAI/litellm application. This flaw allows users...
A critical vulnerability, CVE-2024-9701, has been identified in the Kedro ShelveStore class (version 0.19.8), a component of...
CVE-2024-9919 – Parisneo Lollms Webui Missing Authentication Check Directory Traversal Vulnerability
CVE-2024-9919 – Parisneo Lollms Webui Missing Authentication Check Directory Traversal Vulnerability
A high-severity vulnerability, CVE-2024-9919, has been identified in the parisneo/lollms-webui software, specifically in version V13. This vulnerability...