SmarterTools SmarterMail RCE

What is the Vulnerability? An actively targeted vulnerability has been identified...

UAT-8837 Critical Infrastructure Attack

What is the Attack? An active campaign has been linked, with...

n8n Unauthenticated Remote Code Execution

What is the Vulnerability? CVE-2026-21858 arises from a Content-Type confusion flaw...

Gladinet CentreStack & Triofox Insecure Cryptography Vulnerability

What is the Vulnerability? CVE-2025-14611 is a high-severity insecure cryptography vulnerability...

MongoBleed Unauthenticated Memory Leak

What is the Vulnerability? A critical vulnerability in MongoDB Server’s handling...

Cisco AsyncOS Zero-day

What is the Attack? Cisco has confirmed the active exploitation of...

ArcaneDoor Attack (Cisco ASA Zero-Day)

What is the Attack? Cisco has disclosed a state-sponsored espionage campaign...

React2Shell Remote Code Execution (RCE) Vulnerability

What is the Vulnerability? React2Shell is a critical unauthenticated RCE vulnerability...

React2Shell Remote Code Execution

React2Shell is a critical unauthenticated remote code execution (RCE) vulnerability affecting React Server Components (RSC) and frameworks that implement the Flight protocol, including specific...

Oracle Identity Manager Pre-Auth RCE

What is the Vulnerability? CVE-2025-61757 is a critical pre-authentication remote code...

Latest article

Building an AI-powered defense-in-depth security architecture for serverless microservices

Enterprise customers face an unprecedented security landscape where sophisticated cyber threats use artificial intelligence to identify vulnerabilities, automate attacks, and evade detection...

Fake CAPTCHA Scam Tricks Windows Users Into Installing Malware

A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal passwords, crypto wallets, and more. The post...

16th February – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 16th February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Dutch telecom provider...

Vulnerabilities in Password Managers Allow Hackers to View and Change Passwords

Security researchers have challenged end-to-end encryption claims from popular commercial password managers - Read more