Vulnerability Zero-Day2 Min Read December 13, 2025 Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two security…
Vulnerability Zero-Day2 Min Read December 11, 2025 Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under…
Network Security Zero-Day5 Min Read December 5, 2025 CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of a backdoor named BRICKSTORM that has been put…
Software Security Zero-Day2 Min Read November 22, 2025 CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting Oracle Identity Manager to…
Network Security Zero-Day2 Min Read November 12, 2025 Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws Amazon's threat intelligence team on Wednesday disclosed that it observed an advanced threat actor exploiting two then-zero-day security flaws…
Vulnerability Zero-Day2 Min Read November 6, 2025 Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 Cisco on Wednesday disclosed that it became aware of a new attack variant that's designed to target devices running Cisco Secure Firewall…
Vulnerability Zero-Day1 Min Read October 10, 2025 From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability Cybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security flaw impacting Gladinet…
CVE-2025-61882 exploit proof-of-concept Ransomware rce Zero-Day2 Min Read October 7, 2025 Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks CrowdStrike on Monday said it’s attributing the exploitation of a recently disclosed security flaw in Oracle E-Business Suite with…
Akira Black Basta CVE-2025-10035 exploit IoT Microsoft Ransomware Zero-Day2 Min Read October 6, 2025 Microsoft: Critical GoAnywhere bug exploited in ransomware attacks A cybercrime group, tracked as Storm-1175, has been actively exploiting a maximum severity GoAnywhere MFT vulnerability in Medusa ransomware…
Akira Android Apple Artificial Intelligence AWS Azure backdoor C2 CloudFlare command-and-control conti CVE-2021-43798 CVE-2023-21563 cve-2023-24932 CVE-2024-58260 CVE-2025-10547 CVE-2025-10725 CVE-2025-27915 cve-2025-30247 cve-2025-4008 CVE-2025-41250 CVE-2025-41251 CVE-2025-41252 CVE-2025-43400 cve-2025-49844 CVE-2025-52906 CVE-2025-57714 CVE-2025-59934 CVE-2025-59951 CVE-2025-61882 CVE-2025-9230 CVE-2025-9231 CVE-2025-9232 DDoS denial-of-service exploit firewall Google Cloud ics identity iOS leak macOS Malware Microsoft Mobile Nation-state PCI-DSS Phishing Privacy privilege escalation Ransomware Social Engineering Software Supply Chain spam Spyware state-sponsored Stealer VPN Windows XSS Zero-Day2 Min Read October 6, 2025 Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons…
apt28 CVE-2025-27915 ics Stealer XSS Zero-Day2 Min Read October 6, 2025 Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day earlier this year in cyber attacks targeting the…
conti CVE-2025-61882 exploit Google Cloud Ransomware Zero-Day2 Min Read October 6, 2025 Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks Oracle has released an emergency update to address a critical security flaw in its E-Business Suite that it said has been exploited in the…
Clop conti CVE-2024-50623 CVE-2024-55956 CVE-2025-61882 exploit Google Cloud leaked PoC Ransomware security update Zero-Day4 Min Read October 6, 2025 Oracle patches EBS zero-day exploited in Clop data theft attacks Oracle is warning about a critical E-Business Suite zero-day vulnerability tracked as CVE-2025-61882 that allows attackers to perform…
CVE-2025-27915 exploit ics XSS Zero-Day3 Min Read October 5, 2025 Hackers exploited Zimbra flaw as zero-day using iCalendar files Researchers monitoring for larger .ICS calendar attachments found that a flaw in Zimbra Collaboration Suite (ZCS) was used in…
Vulnerability Zero-Day1 Min Read September 30, 2025 Urgent: China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 A newly patched security flaw impacting Broadcom VMware Tools and VMware Aria Operations has been exploited in the wild as a zero-day since…
Vulnerability Zero-Day2 Min Read September 25, 2025 Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive Cisco is urging customers to patch two security flaws impacting the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA)…
Vulnerability Zero-Day2 Min Read August 30, 2025 WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices WhatsApp has addressed a security vulnerability in its messaging apps for Apple iOS and macOS that it said may have been exploited in the wild…
Vulnerability Zero-Day2 Min Read August 29, 2025 FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available The Sangoma FreePBX Security Team has issued an advisory warning about an actively exploited FreePBX zero-day vulnerability that impacts…
Zero-Day4 Min Read August 25, 2025 Don’t Wait Too Long to Patch: How Organizations Can Stay Ahead of Zero-Day Exploits Among the variety of cyber-attacks that we witness happening around us, Zero-day attacks are remarkably insidious in nature. Due to the fact…
Supply Chain Security Zero-Day5 Min Read August 25, 2025 Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation The term “In the Wild” is broadly used to refer to any activity that has been observed outside of a controlled environment.…
Browser Security Zero-Day3 Min Read August 25, 2025 Google Patches Chrome’s Fifth Zero-Day of the Year An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active…
Vulnerability Zero-Day4 Min Read August 25, 2025 Microsoft August 2025 Patch Tuesday Fixes Kerberos Zero-Day Among 111 Total New Flaws Microsoft on Tuesday rolled out fixes for a massive set of 111 security flaws across its software portfolio, including one flaw that has been…