Uncategorized

Hackers Scanning Microsoft Remote Desktop Web Access From 1000+ IPs

A massive coordinated campaign targeting Microsoft Remote Desktop Protocol (RDP) services, with nearly 2,000 malicious IP addresses conducting simultaneous reconnaissance…

8 months ago

CISA Alerts on Active Exploitation of Citrix Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog on…

8 months ago

Apple 0-Day RCE Vulnerability: PoC Exploit and Analysis Released

A detailed proof-of-concept exploit and vulnerability analysis for CVE-2025-43300, a critical zero-click remote code execution vulnerability affecting Apple devices. The…

8 months ago

Kali Vagrant Rebuild Released – Preconfigured Command-Line VMs

Kali Vagrant Rebuilt, a streamlined toolchain for building and distributing pre-configured virtual machine (VM) images via HashiCorp Vagrant. By replacing…

8 months ago

Critical Mozilla Vulnerabilities Allow Remote Code Execution

Mozilla released Firefox 142 on August 19, 2025, addressing multiple critical security vulnerabilities that could enable remote code execution and…

8 months ago

New QUIC-LEAK Vulnerability Exposes Servers to Memory Exhaustion and Denial-of-Service

A critical vulnerability in the widely-used LSQUIC QUIC implementation that allows attackers to crash servers through memory exhaustion before any…

8 months ago

Scattered Spider Hacker Sentenced to 10 Years in Prison

Noah Urban, better known by his online alias "King Bob," has become the first member of the notorious Scattered Spider cybercrime gang…

8 months ago

Okta Unveils Auth0 Event Logs to Enhance Proactive Threat Detection

Okta has launched the Auth0 Customer Detection Catalog, an open-source repository containing detection rules specifically designed to help security teams…

8 months ago

Copilot Vulnerability Exposes Audit Logs and Grants Secret Access to Attackers

A critical security vulnerability in Microsoft's M365 Copilot allowed users to access sensitive files without generating audit log entries, effectively…

8 months ago

Lenovo AI Chatbot Vulnerability Allows Attackers to Execute Remote Scripts on Corporate Machines

A critical security vulnerability in Lenovo's AI-powered chatbot "Lena" has exposed the company's corporate systems to potential cyberattacks, allowing malicious…

8 months ago