Active Directory (AD) credential dumping remains a significant threat, with attackers increasingly exploiting overlooked attributes like user...
Vulnerability Management
A Shadow Credentials attack is an advanced exploitation technique targeting Active Directory Certificate Services (AD CS), enabling...
A newly identified Mirai botnet variant (IoT.Linux.MIRAI.VWISI) has begun exploiting CVE-2020-10173, a command injection vulnerability in Comtrend...
The Trojan.Win64.HAFNIUM.A malware represents a sophisticated threat targeting Microsoft Exchange servers, initially attributed to the Chinese state-sponsored...
The Trojan.Win32.CVE20188120.E malware represents a persistent threat leveraging CVE-2018-8120, a privilege escalation vulnerability in Windows systems. This...
The ransomware strain Ransom.Win32.BLACKMATTER.THGOCBA presents a moderate-risk threat with significant operational impact potential, primarily targeting Windows environments....
Two significant vulnerabilities in Microsoft Azure Private 5G Core (AP5GC) have been identified and patched, according to...
NetApp has resolved a critical privilege escalation vulnerability (NCSC-2025-0097) in its SnapCenter backup management platform, which could...
A newly disclosed high-severity vulnerability (CVE-2025-24514) in Kubernetes’ ingress-nginx controller enables attackers to execute arbitrary code and...
A critical security vulnerability affecting multiple H3C Magic series routers has been identified, allowing remote attackers to...
Security teams now have access to a powerful new open-source tool for analyzing binary security posture. Extrude...
Bug bounty programs have become a proven strategy for strengthening system security through collaboration with external researchers....
Internal and external penetration testing (pentesting) are critical components for evaluating an organization’s security posture. These simulated...
Large Language Models (LLMs) are increasingly integrated into enterprise workflows, but a new attack vector—ASCII smuggling—exploits Unicode’s...
Microsoft has recently addressed several critical vulnerabilities in its Azure platform, as reported by the Dutch National...
Fortinet has recently addressed a critical vulnerability affecting multiple products, including FortiOS, FortiProxy, FortiPAM, FortiSRA, and FortiWeb....
Adobe has recently addressed critical vulnerabilities in Adobe Acrobat Reader, as highlighted in the NCSC-2025-0084 advisory. These...
On March 12, 2025, Ivanti announced the resolution of a critical vulnerability in its Ivanti Secure Access...
Autodesk has recently addressed multiple vulnerabilities in its AutoCAD software, a critical tool used by architects, engineers,...
Apache Tomcat, a widely used open-source Java servlet container, has recently addressed a critical vulnerability that could...