Published on: March 11, 2026
Overview:Security researchers have observed an increase in cyber threats that use the ongoing Middle East geopolitical conflict as a lure to trick users. Threat actors are creating malicious files, fake news...
Published on: March 3, 2026
Overview:Due to the recent geopolitical escalation involving the U.S., Israel, and Iran, global threat intelligence reports indicate a heightened short-term cyber risk.Historically, during periods of tension involving Iran, there has...
Published on: February 23, 2026
OverviewMicrosoft has patched a critical Remote Code Execution (RCE) vulnerability in the modern Windows Notepad application, tracked as CVE?2026?20841, disclosed during the February 10, 2026 Patch Tuesday release. The flaw arises from...
Published on: February 22, 2026
OverviewThreat actors are actively targeting organizations using device code phishing combined with vishing (voice phishing) to exploit the OAuth 2.0 Device Authorization flow and compromise Microsoft Entra accounts. These attacks differ from...
Published on: February 19, 2026
Overview On February 16, 2026, Google released emergency updates to address CVE?2026?2441, the first actively exploited Chrome zero?day vulnerability discovered this year. This high?severity flaw is a use?after?free vulnerability in the CSS component...
Published on: February 2, 2026
OverviewNotepad++ disclosed a targeted supply?chain compromise involving its software update infrastructure. Forensic analysis conducted by independent security experts and the former hosting provider confirmed that the incident resulted from an infrastructure?level...
Published on: January 28, 2026
Overview: Microsoft has released an out-of-band emergency security update to address a high-severity zero-day vulnerability in Microsoft Office, tracked as CVE-2026-21509. The vulnerability is actively exploited in the wild and allows attackers...
Published on: January 23, 2026
Overview:A high-severity vulnerability has been identified in Google Chrome for Desktop, which could allow a remote attacker to execute arbitrary code on an affected system. The issue arises from a...
Published on: December 28, 2025
OverviewOrganizations are facing a widespread and actively exploited phishing campaign targeting Microsoft 365 (M365) environments through abuse of the OAuth 2.0 device authorization flow. Commonly known as OAuth device code phishing,...
Published on: December 27, 2025
Overview:Fortinet has issued a new advisory warning about active exploitation of an old vulnerability in FortiOS SSL VPN.The vulnerability allows attackers to bypass Two-Factor Authentication (2FA) under certain configurations.Although this issue was...
Published on: December 26, 2025
OverviewTwo malicious Google Chrome extensions published under the name “Phantom Shuttle” have been identified in the Chrome Web Store. These extensions masquerade as legitimate proxy and network-testing tools but secretly hijack user...
Published on: December 22, 2025
OverviewSecurity researchers have identified an emerging China-aligned advanced persistent threat (APT) cluster, tracked as LongNosedGoblin, actively engaging in cyber-espionage against governmental networks in Southeast Asia and Japan. The threat actor has...
Published on: December 18, 2025
OverviewA high-severity local privilege escalation vulnerability has been identified in Microsoft Windows Admin Center (WAC). Tracked as CVE-2025-64669, the issue arises from insecure directory permissions within the Windows Admin Center data...
Published on: December 15, 2025
Overview:Microsoft has released security updates addressing a critical remote code execution (RCE) vulnerability in Microsoft Outlook and related Microsoft Office products. The vulnerability, tracked as CVE-2025-62562, arises from a use-after-free memory...
Published on: November 21, 2025
OverviewOn November 18, 2025, Cloudflare experienced a global outage affecting a significant portion of internet services. The outage was caused by a configuration change to a ClickHouse database cluster, which...
Published on: November 14, 2025
Overview:Amazons threat intelligence team has observed an advanced persistent threat (APT) actor actively exploiting previously undisclosed zero-day vulnerabilities in:Cisco Identity Services Engine (ISE / ISE-PIC) (unauthenticated remote code execution) Citrix NetScaler ADC...
Published on: November 11, 2025
Overview:Google Chrome has released an urgent update addressing five vulnerabilities, including three of high severity that could enable remote code execution (RCE).The patched versions are:Windows: 142.0.7444.134 / 142.0.7444.135macOS: 142.0.7444.135Linux: 142.0.7444.134These flaws...
Published on: November 11, 2025
Top CVE's report for month of November2025November Top Vulnerabilities OverviewIn November, multiple critical and high severity vulnerabilities were disclosed, including remote code execution flaws in widely used services, authentication bypass weaknesses, privilege...
Published on: November 7, 2025
OverviewLinkPro is a newly identified GNU/Linux rootkit discovered by Synacktiv following the compromise of an AWS environment. The intrusion originated from an exposed Jenkins server vulnerable to CVE-2024-23897, which was exploited...
Published on: November 6, 2025
Overview: CISA has issued an urgent alert regarding CVE-2024-1086, a use-after-free vulnerability in the Linux kernel’s netfilter: nf_tables component. The flaw allows local attackers to escalate privileges to root, enabling ransomware...