Synectix LAN 232 TRIO
View CSAF
Summary
Successful exploitation of this vulnerability could result in an unauthenticated attacker modifying critical device settings or factory resetting the device.
The following versions of...
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
Introduction
On February 2, 2026, the developers of Notepad++, a text editor popular among developers, published a statement claiming that the update infrastructure of Notepad++...
Elastic 9.3: Chat with your data, build custom AI agents, automate everything
Elastic 9.3 integrates native workflow automation into the Elasticsearch Platform with Elastic Workflows, enables users to ask questions of their data using natural language...
Elastic Stack 8.19.11 released
Version 8.19.11 of the Elastic Stack was released today. We recommend you upgrade to this latest version. We recommend 8.19.11 over the previous version...
Google Cloud Platform (GCP) Cloud Monitoring PE to Cloud Run Using Uptime Checks Service...
Google Cloud Platform (GCP) Cloud Monitoring PE to Cloud Run Using Uptime Checks Service Agent Authentication Tenable Research has identified and responsibly disclosed a...
NSA Publishes New Zero Trust Implementation Guidelines
NSA released new guidelines to help organizations achieve target-level Zero Trust maturity - Read more
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit
Rapid7 Labs, together with the Rapid7 MDR team, has uncovered a sophisticated campaign attributed to the Chinese APT group Lotus Blossom. Active since 2009,...
Hugging Face Repositories Abused in New Android Malware Campaign
Attackers exploited Hugging Face’s trusted infrastructure to spread an Android RAT, using fake security apps and thousands of malware variants.
The post Hugging Face Repositories...










