Hackers Exploit Fortinet SSO Auth Bypass to Gain Admin Access
Two critical authentication bypass vulnerabilities have been actively exploited in the threat protection solutions offered by Fortinet’s management infrastructure. These […]
Two critical authentication bypass vulnerabilities have been actively exploited in the threat protection solutions offered by Fortinet’s management infrastructure. These […]
AsyncRAT is a notorious C# Remote Access Trojan (RAT) used by threat actors globally. Learn how this open-source malware works,
The critical vulnerability with the identification CVE-2025-55182, which is called ‘React2Shell,’ is being exploited at an accelerated pace by sophisticated
Learn how Shanya, a new packer-as-a-service used by ransomware to evade EDR, conceals malware and disables security tools. Packer technology
A Chinese threat actor codenamed “Silver Fox” has been tricking users with a fake Microsoft Teams download to spread the
Explore WannaCry’s full campaign history, from its unprecedented global outbreak via the EternalBlue SMB exploit to its devastating impacts on
The Shai-Hulud worm targeted the npm packages quite aggressively and led to the compromise of 400,000 developer credentials. This threat
Aras Cargo, a Turkish delivery giant, was hit by a cyberattack that halted shipments nationwide. Learn what happened and how
South Korea saw two data breaches: a leak of 33.7 million Coupang accounts and a hack of 120,000 home security
Airbus issues an urgent safety notice for A320 jets after discovering intense solar radiation can corrupt flight control data, prompting
XWorm is a dangerous remote access trojan (RAT) with ransomware capabilities and over 35 plugins. Learn how XWorm works, real-world
The OpenAI Mixpanel breach exposed API user data via a vendor’s smishing attack. When Vendor Trust Fails, A Modern Supply