CISA Updates Catalog with Six New Exploited Vulnerabilities
Discover the latest vulnerabilities added to CISA's Known Exploited Vulnerabilities Catalog and understand the critical steps organizations must take to mitigate these threats.
Discover the latest vulnerabilities added to CISA's Known Exploited Vulnerabilities Catalog and understand the critical steps organizations must take to mitigate these threats.
Explore the latest CISA update on actively exploited vulnerabilities in Advantive VeraCore and Ivanti EPM, and learn how to protect your systems.
TL;DR The threat actor Blind Eagle has been actively targeting Colombian institutions since November 2024, exploiting an NTLM flaw and using Remote Access Trojans (RATs) alongside GitHub-based atta...
TL;DR The Ballista botnet campaign targets unpatched TP-Link Archer routers by exploiting a remote code execution vulnerability, resulting in over 6,000 devices being infected. Ballista Botnet Exp...
Discover how Apple swiftly addressed a severe WebKit zero-day exploit used in advanced cyberattacks. Learn about the updates and their significance for user security.
Discover how 88% of security teams are achieving their performance goals despite limited staff and increased workloads. Learn about their strategies and successes.
A senior software developer has been found guilty of sabotaging his former employer's systems, potentially facing ten years in prison. Learn about the implications and consequences of this cyber at...
Are you tired of dealing with outdated security tools that never seem to give you the full picture? You're not alone. Many organizations struggle with piecing together scattered information, leavin...
Threat actors have launched a malicious campaign targeting organizations in Japan since January 2025. The attackers exploit the PHP-CGI RCE vulnerability (CVE-2024-4577) to gain access to victim ma...
Mirai-based botnets are exploiting a zero-day flaw in Edimax IP cameras for remote command execution. US CISA warns of the vulnerability, urging organizations to report suspicious activity. Learn m...