Hackers are exploiting critical Fortinet flaws days after patch release
Hackers are exploiting critical Fortinet flaws days after patch release Pierluigi Paganini December 16, 2025 Threat actors are exploiting two...
Hackers are exploiting critical Fortinet flaws days after patch release Pierluigi Paganini December 16, 2025 Threat actors are exploiting two...
Nov 20, 2025Ravie LakshmananVulnerability / Cloud Computing Oligo Security has warned of ongoing attacks exploiting a two-year-old security flaw in...
RondoDox expands botnet by exploiting XWiki RCE bug left unpatched since February 2025 Pierluigi Paganini November 17, 2025 RondoDox botnet...
Oct 29, 2025Ravie LakshmananVulnerability / Malware Threat actors are actively exploiting multiple security flaws impacting Dassault Systèmes DELMIA Apriso and...
Wordfence blocks 8.7M attacks exploiting old GutenKit and Hunk Companion flaws Pierluigi Paganini October 27, 2025 Hackers exploited old RCE...
The threat of ransomware and data theft continues to evolve. Adversaries are increasingly exploiting unpatched network-edge devices, and credential theft...
Oct 09, 2025Ravie LakshmananVulnerability / Website Security Threat actors are actively exploiting a critical security flaw impacting the Service Finder...
An assessment by DHS found that hackers were able to access FEMA servers by exploiting the CitrixBleed 2 vulnerability and...
How threat actors breached a U.S. federal civilian agency by exploiting a GeoServer flaw Pierluigi Paganini September 24, 2025 US...
A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in SAP NetWeaver. Forescout...
Threat actors have been observed actively exploiting security flaws in GeoVision end-of-life (EoL) Internet of Things (IoT) devices to corral...
Threat actors have been observed exploiting two newly disclosed critical security flaws in Craft CMS in zero-day attacks to breach...
Malicious individuals are probably taking advantage of a novel weakness in SAP NetWeaver to transfer JSP web shells in order...
An entity linked to China and recognized for its digital offensives in the Asian region has been detected leveraging a...
Malicious entities are capitalizing on a critical security loophole in PHP to disseminate digital currency miners and remote access trojans...