Play ransomware affiliate leveraged zero-day to deploy malware

10 months ago

The Play ransomware gang exploited a high-severity Windows Common Log File System flaw in zero-day attacks to deploy malware. The Play…

Canary Exploit tool allows to find servers affected by Apache Parquet flaw

10 months ago

F5 Labs researchers released a PoC tool to find servers vulnerable to the Apache Parquet vulnerability CVE-2025-30065. A working proof-of-concept…

Unsophisticated cyber actors are targeting the U.S. Energy sector

10 months ago

CISA, FBI, EPA, and DoE warn of cyberattacks on the U.S. Energy sector carried out by unsophisticated cyber actors targeting…

NSO Group must pay WhatsApp over $167M in damages for attacks on its users

10 months ago

NSO Group must pay WhatsApp over $167M in damages for a 2019 hack targeting 1,400+ users, per U.S. jury ruling…

U.S. CISA adds FreeType flaw to its Known Exploited Vulnerabilities catalog

10 months ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds FreeType flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure…

Samsung MagicINFO flaw exploited days after PoC exploit publication

10 months ago

Threat actors started exploiting a vulnerability in Samsung MagicINFO only days after a PoC exploit was published. Arctic Wolf researchers…

Experts warn of a second wave of attacks targeting SAP NetWeaver bug CVE-2025-31324<gwmw style="display:none;"></gwmw>

10 months ago

Threat actors launch second wave of attacks on SAP NetWeaver, exploiting webshells from a recent zero-day vulnerability. In April, ReliaQuest…

U.S. CISA adds Langflow flaw to its Known Exploited Vulnerabilities catalog

10 months ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Langflow flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and…

Google fixed actively exploited Android flaw CVE-2025-27363

10 months ago

Google addressed 46 Android security vulnerabilities, including one issue that has been exploited in attacks in the wild. Google's monthly…

New ‘Bring Your Own Installer (BYOI)’ technique allows to bypass EDR

10 months ago

A new BYOI technique lets attackers bypass SentinelOne EDR, disable protection, and deploy Babuk ransomware by exploiting the agent upgrade…

This website uses cookies.