top of page


Aug 19, 2024
Unveiling the Cloud's Achilles' Heel: How a Hidden Entra ID Flaw Threatens Organizational Security
The Download A senior cloud security researcher at Semperis announced a critical vulnerability in Microsoft Entra ID at Black Hat, where...

Aug 18, 2024
Unlocking the Inbox: How a 0-Click Vulnerability in Outlook Opened the Door to Remote Code Execution
The Download A critical vulnerability in Microsoft Outlook ( identified as CVE-2024-30103 ) allows malicious code to run to enable...


Aug 15, 2024
Silent Threat: 0-Click RCE Vulnerability Exposes All Windows Systems to Total Takeover
The Download Microsoft announced a rare 0-click vulnerability (CVE-2024-38063) with CVSS severity score of 9.8/10 in the Windows TCP/IP...

Aug 11, 2024
Critical AWS Flaws: Behind the Patch that Prevented Cloud Account Takeovers
The Download Security company Aqua Security disclosed a flaw at BlackHat that if left unpatched could allow attackers to gain control of...

Aug 11, 2024
New 0.0.0.0 Day Flaw Allows Browser Bypass to Compromise Hosts
The Download A flaw in the underlying Webkit used by major browsers including Google Chrome, Safari, and Firefox allows remote attackers...

Aug 4, 2024
Managing the Vulnerability Explosion: Top Insights into Vulnerability Exploitation and Management
Chart courtesy of Cyentia Institute Report "A Visual Exploration of Exploitation in the Wild: An Inaugural Study of EPSS Data and...

Aug 4, 2024
Russian Ransomware Gangs Rake in $500M in Extortion Payments in 2023
The Download Russian-speaking ransomware gangs are responsible for 69% of global ransomware proceeds, amounting to over $500 million in...


Aug 4, 2024
Sitting Duck Attack Leaves 1M Domains Vulnerable to Hijack
The Download Security researchers disclosed the "Sitting Duck" vulnerability has been exploited to hijack over 35,000 domains already,...


Jul 29, 2024
Urgent: Critical Vulnerability in Telerik UI Components Exposes Systems to Remote Attacks
The Download Progress Software announced another critical vulnerability in Progress Telerik Report Server UI components, identified as...


Jul 29, 2024
Despite Microsoft Defender Fix, Hackers Still Exploit Vulnerabilities to Deliver Malware
The Download Despite Microsoft’s recent patch for a critical flaw in Microsoft Defender, cybersecurity experts report that this...

Jul 29, 2024
Acronis Vuln Raises Red Flag on Default Passwords
The Download Acronis has raised a red flag about a significant security vulnerability in its Cyber Infrastructure (ACI) product line that...

Jul 22, 2024
Ransomware Gangs Exploiting Year Old Veeam Vulnerability
The Download It is not as uncommon as one might expect, but older vulnerabilities often find new life when a ransomware gang weaponizes...


Jul 22, 2024
CrowdStrike Bug Cost Enterprises $100M on Average in Losses
The Download By now you know all about the CrowdStrike bug that brought down enterprises, major financial institutions, agencies of the...


Jul 15, 2024
New OpenSSH Vulnerability Disclosed on Heels of RegreSSHion Vulnerability
The Download Following on the heels of the regreSSHion vulnerability, a new related vulnerability has just been disclosed. Tracked as...

Jul 15, 2024
Exploit Bypasses 1.5M Exim Mail Security Filters
The Download Security firm Censys warned that 1.5 million Exim mail transfer agents (MTAs) were vulnerable to an attack that can bypass...


Jul 15, 2024
22 Minutes is How Long it Takes
The Download A new study released by security company Cloud Flare shows hackers can begin weaponizing and exploiting vulnerabilities as...

Jul 8, 2024
HFS File Server Vulnerability PoC Exploit Code Released
The Download Proof of concept (PoC) exploit code for HTTP file server (HFS) vulnerability (CVE-2024-39943) is now out in the wild. The...


Jul 8, 2024
GhostScript Vulnerability Places Web Servers at Risk
The Download A vulnerability in GhostScript that went largely unnoticed is now being understood to be a major vulnerability in many web...


Jul 8, 2024
New RegreSSHion Vulnerability Exposes Massive Attack Surface
The Download Researchers at security firm Qualys found a severe vulnerability in the popular remote login protocol OpenSSH that has a...


Jul 1, 2024
D-Link Router Vulnerability Actively Exploited
The Download The year of router, firewall and VPN vulnerabilities continues forward. If you are running a D-Link DIR-859 router you need...
bottom of page