Threat Report and Advisories

Timely analysis of emerging risks, security trends, and protective strategies.

Malware Threat Intelligence Reports

Unmasking MonsterV2: A Deep Dive into TA585's Multi-Functional Malware

October 16, 2025

Malware Threat Intelligence Reports

Blockchain-Powered Malware Attacks on WordPress: A New Cyber Threat

October 17, 2025

Vulnerability

Invisible Intrusion: The Stealthy Exploitation of Fortinet Devices via CVE-2022-40684

October 21, 2025

Malware Threat Intelligence Reports

New Spyware Masquerades as Signal & ToTok Apps to Target Android Users

November 7, 2025

Malware Threat Intelligence Reports

Silver Fox Expands: Winos 4.0 Malware Targets Southeast Asia with Privilege Escalation

October 20, 2025

Malware Threat Intelligence Reports

Qilin Ransomware: Cross-Platform Attacks Leveraging Linux Payloads on Windows

October 28, 2025

Malware Threat Intelligence Reports

DeskRAT Strikes Indian Government with a New Golang Malware Wave

October 28, 2025

Malware Threat Intelligence Reports

When Chrome Extensions Turn Rogue: The Hidden Dangers Behind Browser Add-ons

October 24, 2025

Malware Threat Intelligence Reports

Gunra's Linux Variant: A Scalable, Multi-Threaded Encryption Threat

October 27, 2025

Vulnerability

TARmageddon: How a Rust Logic Flaw Opened the Door to Remote Code Execution

October 23, 2025

Malware Threat Intelligence Reports

Iran-Linked MuddyWater: Cross-Border Espionage Targeting 100+ Diplomatic Entities

October 23, 2025

Data Breach Notifications

Widespread SonicWall VPN Compromise Detected Across Multiple Environments

October 13, 2025

Vulnerability

Zero-Click Admin Access: CVE-2025-5947 Threatens WordPress Booking Sites

October 13, 2025

Malware Threat Intelligence Reports

Ongoing Threat Alert as BatShadow Deploys New Vampire Bot Targeting Job Seekers

October 8, 2025

Malware Threat Intelligence Reports

Cavalry Werewolf Unleashed: A New Nation-State Threat Targeting Energy and Government Sectors

October 7, 2025

Vulnerability

Actively Exploited Linux Sudo Vulnerability: CISA Recommends Urgent Patching

October 3, 2025

Malware Threat Intelligence Reports

EvilAI : From Fake Downloads to Full-System Compromise

September 30, 2025

Malware Threat Intelligence Reports

LNK-to-Load: New LNK Malware Abuses Windows Binaries to Evade Security

September 26, 2025

Malware Threat Intelligence Reports

Multi-Stage DLL Sideloading: A Stealthy Malware Delivery Mechanism

September 24, 2025

Malware Threat Intelligence Reports

Kawa4096 Ransomware: A Rising Threat to Multinational Corporations

September 27, 2025

Data Breach Notifications

SonicWall Urges Password Resets After Cloud Backup Breach

September 19, 2025

Malware Threat Intelligence Reports

Unmasking Buterat: The Latest Backdoor Malware on the Rise

September 15, 2025

Malware Threat Intelligence Reports

BQTLOCK Ransomware Operates as RaaS

August 27, 2025

Malware Threat Intelligence Reports

GodRAT - New RAT Variant Targets Trading Firms

August 29, 2025

Network Security

New Peak in Hyper Volumetric DDoS Attacks Hits 7.3?Tbps

July 16, 2025

Vulnerability

Multiple Vulnerabilities in Commvault Enable Remote Code Execution

August 22, 2025

Malware Threat Intelligence Reports

Tracking DevilsTongue Spyware Incidents Across Multiple Countries

August 20, 2025

Malware Threat Intelligence Reports

Crypto24 Ransomware Attacks Disable EDR With Custom Tools

August 19, 2025

Vulnerability

Fortinet Release August Security Patches Addressing Multiple Vulnerabilities

August 13, 2025

Malware Threat Intelligence Reports

Middle East Sectors targeted by Charon ransomware

August 15, 2025

Malware Threat Intelligence Reports

DarkCloud Stealer Employs New Infection Chain

August 11, 2025

Malware Threat Intelligence Reports

MuddyWater Unleashes New DCHSpy Android Spyware Amid Middle East Tensions

July 22, 2025

Vulnerability

Cryptocurrency Miner Installed via Apache HTTP Server Path-Traversal Flaw

July 18, 2025

Phishing & Social Engineering

Matanbuchus 3.0 Loader Delivered via Malicious Microsoft Teams Calls

July 17, 2025

Phishing & Social Engineering

Hidden Prompt-Injection in Google Gemini Enables AI-Powered Phishing

July 15, 2025

Web Application Security

Critical SQL Injection Flaw in FortiWeb Exposed

July 14, 2025

Phishing & Social Engineering

ClickFix Spin Off Attack Bypasses Key Browser Safeguards

July 11, 2025

Malware Threat Intelligence Reports

Trojanized PuTTY & WinSCP Installers Deliver Oyster Backdoor

July 8, 2025

Phishing & Social Engineering

Ziggy Strike Campaign

June 30, 2025

Vulnerability

Mocha Manakin Deploys NodeInitRAT

June 25, 2025

Malware Threat Intelligence Reports

Anubis Ransomware Evolves with Integrated Wiper, Leaving Victims No Recovery Path

June 17, 2025

Software Update Advisories

Citrix Emergency Patch for NetScaler ADC CVE-2025-6543

June 26, 2025

Threat Intelligence

Global Cyberattack Surge as Hacktivist and APT Campaigns Intensify Worldwide

June 18, 2025

Vulnerability

Trend Micro Addresses critical vulnerabilities in PolicyServer

June 16, 2025

Malware Threat Intelligence Reports

NightSpire Strikes: Analyzing the Latest Ransomware Operations

June 12, 2025

Malware Threat Intelligence Reports

Gunra Ransomware Targets Critical Sectors Worldwide Using Double-Extortion Tactics

June 5, 2025

Threat Intelligence

Cyber-attacks and threats likely to increase in Middle East

June 4, 2025

Threat Intelligence

UnsolicitedBooker's Deployment of MarsSnake Backdoor

May 26, 2025

Phishing & Social Engineering

Phishing Campaign Targeting Kuwait's Fisheries, Telecom, and Insurance Sectors

May 22, 2025

Vulnerability

Critical RD Gateway Vulnerability

May 19, 2025

Vulnerability

Microsoft May 2025 Patch Tuesday Security Bulletin

May 15, 2025

Vulnerability

Critical Command Injection Vulnerability Discovered in F5 BIG-IP

May 14, 2025

Vulnerability

ASUS Driver Hub Vulnerabilities Could Let Malicious Websites Gain Admin Privileges

May 13, 2025

Endpoint Protection

"Bring Your Own Installer" Attack Exploits SentinelOne EDR Misconfigurations

May 12, 2025

Malware Threat Intelligence Reports

Fake AI Video Tools Platforms Drop New Noodlophile Infostealer Malware

May 12, 2025

Malware Threat Intelligence Reports

Lemon Sandstorm Breach Middle East Infrastructure

May 8, 2025

Malware Threat Intelligence Reports

Earth Kurma APT Campaign Targets Government and Telecom Sectors in Southeast Asia

May 1, 2025

Malware Threat Intelligence Reports

Uncover APT34-Like Infrastructure Before It Becomes a Threat

May 7, 2025

Malware Threat Intelligence Reports

HexaLocker Ransomware: A Modern Threat Forged for Maximum Pressure

May 5, 2025

Threat Intelligence

Surge in GPS Spoofing Threatens Aviation Safety in Middle East

April 24, 2025

Phishing & Social Engineering

Digital Crumbs: Exploiting Entra ID's Session Cookies to Breach Microsoft 365

April 23, 2025

Vulnerability

Critical Remote Code Execution Vulnerability in Cisco Webex App

April 21, 2025

Malware Threat Intelligence Reports

Android Phones Preloaded with Trojanized WhatsApp Target User Crypto Wallets

April 21, 2025

Phishing & Social Engineering

Beware of Malicious Campaigns with HR and Target Employee Trust

April 15, 2025

Malware Threat Intelligence Reports

Waiting Thread Hijacking Malware Technique Bypasses Modern Defenses

April 18, 2025

Vulnerability

Critical Remote Vulnerability in Gladinet CentreStack and Triofox Actively Exploited

April 15, 2025

Malware Threat Intelligence Reports

Beware Fake PDF Converters: Malware Stealing Passwords

April 17, 2025

Vulnerability

Vulnerabilities in CrushFTP Could Allow Internal Scanning and SMB File Access

April 16, 2025

Vulnerability

Apple Fixes Critical macOS Vulnerability April Security Update

April 10, 2025

Vulnerability

Fortinet Urges Immediate Action on Critical FortiSwitch Vulnerability

April 8, 2025

Vulnerability

High-Severity Vulnerability in VMware Tools Allows Privilege Escalation

March 27, 2025

Vulnerability

Cisco Patches Two High-Severity Flaws in ECE and Meraki VPN Devices

April 8, 2025

Vulnerability

Apache Traffic Server Flaw Enables HTTP Request Smuggling Attacks

April 7, 2025

Phishing & Social Engineering

PoisonSeed - A Sophisticated Phishing Campaign Seeks Extensive Crypto Theft

April 8, 2025

Vulnerability

Critical Vulnerabilities in Ivanti Products Leave Enterprises Exposed to Remote Attacks

April 7, 2025

Zero-Day Exploits

Apple Fixes Recent Zero-Days in Older Devices

April 3, 2025

Phishing & Social Engineering

Surge in Real Estate Scams Across the Middle East

March 26, 2025

Vulnerability

High-Risk Junos OS Vulnerability Exposes Networks to Privilege Escalation Risks

March 20, 2025

Data Breach Notifications

Six Million Records Reportedly Stolen in Oracle Cloud Breach

March 25, 2025

Application Security

Zoom Issues Urgent Patch for High-Risk Vulnerabilities

March 13, 2025

Vulnerability

Critical Apache Tomcat Vulnerability Enables Remote Code Execution

March 18, 2025

Vulnerability

Type Confusion in V8 in Google Chrome Vulnerabilities

March 12, 2025

Zero-Day Exploits

Zero-Day Vulnerabilities Active in VMware ESXi & Workstations

March 11, 2025

Vulnerability

Commvault Reported Critical Webserver Vulnerability

March 11, 2025

Vulnerability

Critical Security Vulnerabilities in Extreme Networks HiveOS

March 4, 2025

Application Security

Severe Security Vulnerabilities in IBM Storage Virtualize

March 5, 2025

Threat Report and Advisories

Severe RCE Flaw Discovered in Everest Forms WordPress Plugin

February 26, 2025

Phishing & Social Engineering

Phishing Campaign Abuses Webflow CDN & CAPTCHAs to Steals Credit Card Data

February 19, 2025

Software Update Advisories

Chrome Buffer Overflow Vulnerabilities Allow Arbitrary Code Execution

February 19, 2025

Threat Report and Advisories

Orion Hackers Ransomware, LockBit 3.0 (LockBit Black)

February 18, 2025

Vulnerability

Lazarus Group Deploys Sophisticated Infostealer Malware

February 17, 2025

Threat Report and Advisories

Microsoft Releases Fixes for 63 Flaws and Two Actively Used Zero-Day Vulnerabilities

February 13, 2025

Threat Report and Advisories

CmbLabs Ransomware: The Growing Threat to Data Security

February 11, 2025

Malware Threat Intelligence Reports

SparkCat Malware: The Next-Gen Crypto Stealer Using OCR to Target Mobile Users

February 11, 2025

Vulnerability

Ivanti Addresses Critical Vulnerabilities Affecting Several Products

February 13, 2025

Zero-Day Exploits

Apple Release Urgent Security Update for IOS to Address Critical Zero-Day

February 12, 2025

Endpoint Protection

Enhance Your Defense against Hunter (Prince) Ransomware

February 7, 2025

Vulnerability

DeepSeek iOS App has Severe Security Flaws

February 12, 2025

Vulnerability

Microsoft Fixes Critical Vulnerability in Azure Ai Face Service

February 4, 2025

Zero-Day Exploits

Apple Fixes Zero-Day Affecting iOS Devices

January 29, 2025

Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Unmasking MonsterV2: A Deep Dive into TA585's Multi-Functional Malware

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Blockchain-Powered Malware Attacks on WordPress: A New Cyber Threat

Know More
Know More
Vulnerability

Vulnerability

Invisible Intrusion: The Stealthy Exploitation of Fortinet Devices via CVE-2022-40684

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

New Spyware Masquerades as Signal & ToTok Apps to Target Android Users

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Silver Fox Expands: Winos 4.0 Malware Targets Southeast Asia with Privilege Escalation

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Qilin Ransomware: Cross-Platform Attacks Leveraging Linux Payloads on Windows

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

DeskRAT Strikes Indian Government with a New Golang Malware Wave

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

When Chrome Extensions Turn Rogue: The Hidden Dangers Behind Browser Add-ons

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Gunra's Linux Variant: A Scalable, Multi-Threaded Encryption Threat

Know More
Know More
Vulnerability

Vulnerability

TARmageddon: How a Rust Logic Flaw Opened the Door to Remote Code Execution

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Iran-Linked MuddyWater: Cross-Border Espionage Targeting 100+ Diplomatic Entities

Know More
Know More
Data Breach Notifications

Data Breach Notifications

Widespread SonicWall VPN Compromise Detected Across Multiple Environments

Know More
Know More
Vulnerability

Vulnerability

Zero-Click Admin Access: CVE-2025-5947 Threatens WordPress Booking Sites

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Ongoing Threat Alert as BatShadow Deploys New Vampire Bot Targeting Job Seekers

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Cavalry Werewolf Unleashed: A New Nation-State Threat Targeting Energy and Government Sectors

Know More
Know More
Vulnerability

Vulnerability

Actively Exploited Linux Sudo Vulnerability: CISA Recommends Urgent Patching

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

EvilAI : From Fake Downloads to Full-System Compromise

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

LNK-to-Load: New LNK Malware Abuses Windows Binaries to Evade Security

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Multi-Stage DLL Sideloading: A Stealthy Malware Delivery Mechanism

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Kawa4096 Ransomware: A Rising Threat to Multinational Corporations

Know More
Know More
Data Breach Notifications

Data Breach Notifications

SonicWall Urges Password Resets After Cloud Backup Breach

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Unmasking Buterat: The Latest Backdoor Malware on the Rise

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

BQTLOCK Ransomware Operates as RaaS

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

GodRAT - New RAT Variant Targets Trading Firms

Know More
Know More
Network Security

Network Security

New Peak in Hyper Volumetric DDoS Attacks Hits 7.3?Tbps

Know More
Know More
Vulnerability

Vulnerability

Multiple Vulnerabilities in Commvault Enable Remote Code Execution

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Tracking DevilsTongue Spyware Incidents Across Multiple Countries

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Crypto24 Ransomware Attacks Disable EDR With Custom Tools

Know More
Know More
Vulnerability

Vulnerability

Fortinet Release August Security Patches Addressing Multiple Vulnerabilities

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Middle East Sectors targeted by Charon ransomware

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

DarkCloud Stealer Employs New Infection Chain

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

MuddyWater Unleashes New DCHSpy Android Spyware Amid Middle East Tensions

Know More
Know More
Vulnerability

Vulnerability

Cryptocurrency Miner Installed via Apache HTTP Server Path-Traversal Flaw

Know More
Know More
Phishing & Social Engineering

Phishing & Social Engineering

Matanbuchus 3.0 Loader Delivered via Malicious Microsoft Teams Calls

Know More
Know More
Phishing & Social Engineering

Phishing & Social Engineering

Hidden Prompt-Injection in Google Gemini Enables AI-Powered Phishing

Know More
Know More
Web Application Security

Web Application Security

Critical SQL Injection Flaw in FortiWeb Exposed

Know More
Know More
Phishing & Social Engineering

Phishing & Social Engineering

ClickFix Spin Off Attack Bypasses Key Browser Safeguards

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Trojanized PuTTY & WinSCP Installers Deliver Oyster Backdoor

Know More
Know More
Phishing & Social Engineering

Phishing & Social Engineering

Ziggy Strike Campaign

Know More
Know More
Vulnerability

Vulnerability

Mocha Manakin Deploys NodeInitRAT

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Anubis Ransomware Evolves with Integrated Wiper, Leaving Victims No Recovery Path

Know More
Know More
Software Update Advisories

Software Update Advisories

Citrix Emergency Patch for NetScaler ADC CVE-2025-6543

Know More
Know More
Threat Intelligence

Threat Intelligence

Global Cyberattack Surge as Hacktivist and APT Campaigns Intensify Worldwide

Know More
Know More
Vulnerability

Vulnerability

Trend Micro Addresses critical vulnerabilities in PolicyServer

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

NightSpire Strikes: Analyzing the Latest Ransomware Operations

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Gunra Ransomware Targets Critical Sectors Worldwide Using Double-Extortion Tactics

Know More
Know More
Threat Intelligence

Threat Intelligence

Cyber-attacks and threats likely to increase in Middle East

Know More
Know More
Threat Intelligence

Threat Intelligence

UnsolicitedBooker's Deployment of MarsSnake Backdoor

Know More
Know More
Phishing & Social Engineering

Phishing & Social Engineering

Phishing Campaign Targeting Kuwait's Fisheries, Telecom, and Insurance Sectors

Know More
Know More
Vulnerability

Vulnerability

Critical RD Gateway Vulnerability

Know More
Know More
Vulnerability

Vulnerability

Microsoft May 2025 Patch Tuesday Security Bulletin

Know More
Know More
Vulnerability

Vulnerability

Critical Command Injection Vulnerability Discovered in F5 BIG-IP

Know More
Know More
Vulnerability

Vulnerability

ASUS Driver Hub Vulnerabilities Could Let Malicious Websites Gain Admin Privileges

Know More
Know More
Endpoint Protection

Endpoint Protection

"Bring Your Own Installer" Attack Exploits SentinelOne EDR Misconfigurations

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Fake AI Video Tools Platforms Drop New Noodlophile Infostealer Malware

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Lemon Sandstorm Breach Middle East Infrastructure

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Earth Kurma APT Campaign Targets Government and Telecom Sectors in Southeast Asia

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Uncover APT34-Like Infrastructure Before It Becomes a Threat

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

HexaLocker Ransomware: A Modern Threat Forged for Maximum Pressure

Know More
Know More
Threat Intelligence

Threat Intelligence

Surge in GPS Spoofing Threatens Aviation Safety in Middle East

Know More
Know More
Phishing & Social Engineering

Phishing & Social Engineering

Digital Crumbs: Exploiting Entra ID's Session Cookies to Breach Microsoft 365

Know More
Know More
Vulnerability

Vulnerability

Critical Remote Code Execution Vulnerability in Cisco Webex App

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Android Phones Preloaded with Trojanized WhatsApp Target User Crypto Wallets

Know More
Know More
Phishing & Social Engineering

Phishing & Social Engineering

Beware of Malicious Campaigns with HR and Target Employee Trust

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Waiting Thread Hijacking Malware Technique Bypasses Modern Defenses

Know More
Know More
Vulnerability

Vulnerability

Critical Remote Vulnerability in Gladinet CentreStack and Triofox Actively Exploited

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

Beware Fake PDF Converters: Malware Stealing Passwords

Know More
Know More
Vulnerability

Vulnerability

Vulnerabilities in CrushFTP Could Allow Internal Scanning and SMB File Access

Know More
Know More
Vulnerability

Vulnerability

Apple Fixes Critical macOS Vulnerability April Security Update

Know More
Know More
Vulnerability

Vulnerability

Fortinet Urges Immediate Action on Critical FortiSwitch Vulnerability

Know More
Know More
Vulnerability

Vulnerability

High-Severity Vulnerability in VMware Tools Allows Privilege Escalation

Know More
Know More
Vulnerability

Vulnerability

Cisco Patches Two High-Severity Flaws in ECE and Meraki VPN Devices

Know More
Know More
Vulnerability

Vulnerability

Apache Traffic Server Flaw Enables HTTP Request Smuggling Attacks

Know More
Know More
Phishing & Social Engineering

Phishing & Social Engineering

PoisonSeed - A Sophisticated Phishing Campaign Seeks Extensive Crypto Theft

Know More
Know More
Vulnerability

Vulnerability

Critical Vulnerabilities in Ivanti Products Leave Enterprises Exposed to Remote Attacks

Know More
Know More
Zero-Day Exploits

Zero-Day Exploits

Apple Fixes Recent Zero-Days in Older Devices

Know More
Know More
Phishing & Social Engineering

Phishing & Social Engineering

Surge in Real Estate Scams Across the Middle East

Know More
Know More
Vulnerability

Vulnerability

High-Risk Junos OS Vulnerability Exposes Networks to Privilege Escalation Risks

Know More
Know More
Data Breach Notifications

Data Breach Notifications

Six Million Records Reportedly Stolen in Oracle Cloud Breach

Know More
Know More
Application Security

Application Security

Zoom Issues Urgent Patch for High-Risk Vulnerabilities

Know More
Know More
Vulnerability

Vulnerability

Critical Apache Tomcat Vulnerability Enables Remote Code Execution

Know More
Know More
Vulnerability

Vulnerability

Type Confusion in V8 in Google Chrome Vulnerabilities

Know More
Know More
Zero-Day Exploits

Zero-Day Exploits

Zero-Day Vulnerabilities Active in VMware ESXi & Workstations

Know More
Know More
Vulnerability

Vulnerability

Commvault Reported Critical Webserver Vulnerability

Know More
Know More
Vulnerability

Vulnerability

Critical Security Vulnerabilities in Extreme Networks HiveOS

Know More
Know More
Application Security

Application Security

Severe Security Vulnerabilities in IBM Storage Virtualize

Know More
Know More
Threat Report and Advisories

Threat Report and Advisories

Severe RCE Flaw Discovered in Everest Forms WordPress Plugin

Know More
Know More
Phishing & Social Engineering

Phishing & Social Engineering

Phishing Campaign Abuses Webflow CDN & CAPTCHAs to Steals Credit Card Data

Know More
Know More
Software Update Advisories

Software Update Advisories

Chrome Buffer Overflow Vulnerabilities Allow Arbitrary Code Execution

Know More
Know More
Threat Report and Advisories

Threat Report and Advisories

Orion Hackers Ransomware, LockBit 3.0 (LockBit Black)

Know More
Know More
Vulnerability

Vulnerability

Lazarus Group Deploys Sophisticated Infostealer Malware

Know More
Know More
Threat Report and Advisories

Threat Report and Advisories

Microsoft Releases Fixes for 63 Flaws and Two Actively Used Zero-Day Vulnerabilities

Know More
Know More
Threat Report and Advisories

Threat Report and Advisories

CmbLabs Ransomware: The Growing Threat to Data Security

Know More
Know More
Malware Threat Intelligence Reports

Malware Threat Intelligence Reports

SparkCat Malware: The Next-Gen Crypto Stealer Using OCR to Target Mobile Users

Know More
Know More
Vulnerability

Vulnerability

Ivanti Addresses Critical Vulnerabilities Affecting Several Products

Know More
Know More
Zero-Day Exploits

Zero-Day Exploits

Apple Release Urgent Security Update for IOS to Address Critical Zero-Day

Know More
Know More
Endpoint Protection

Endpoint Protection

Enhance Your Defense against Hunter (Prince) Ransomware

Know More
Know More
Vulnerability

Vulnerability

DeepSeek iOS App has Severe Security Flaws

Know More
Know More
Vulnerability

Vulnerability

Microsoft Fixes Critical Vulnerability in Azure Ai Face Service

Know More
Know More
Zero-Day Exploits

Zero-Day Exploits

Apple Fixes Zero-Day Affecting iOS Devices

Know More
Know More