Skip to content

Articles tagged: zero-day

95 articles found

low angle photography of building
targeted-attackscritical-infrastructurezero-day

Critical Infrastructure Under Siege

Targeted attacks on critical infrastructure are escalating, with Juniper Networks patching dozens of vulnerabilities and Russia's APT28 spying on global organizations. Learn about the key threats and how to protect your systems.

4 min read
A security and privacy dashboard with its status.
emerging-threatszero-daywindows

GlassWorm Campaign Evolves with Zig Dropper

The GlassWorm campaign has introduced a new Zig dropper to infect developer IDEs, while Russian submarine activity near undersea cables and a Windows zero-day vulnerability pose significant threats. Learn about these emerging threats and how to protect against them.

5 min read
Computer screen displaying code with a context menu.
zero-dayremote-code-executionchrome-vulnerability

Marimo & Chrome Under Attack

Critical vulnerabilities in Marimo and Chrome pose significant risks to users, with exploits already reported in the wild. Learn about the technical details and implications of these threats.

4 min read
computer screen showing blog
zero-daysocial-engineeringwordpress

Notable Security Incidents and Research

Recent security incidents include Cloudflare's post-quantum security roadmap, zero-day exploits for the human mind, and backdoored updates for WordPress and Joomla plugins. These threats highlight the need for long-term cryptographic planning and awareness of social engineering tactics.

4 min read
macbook pro on black table
ai-securityzero-daymacos

AI Security Risks Exposed

Recent attacks on Apple Intelligence and Grafana highlight the growing concern of AI-related security risks. Enterprises are deploying AI without fully understanding the risks, including model collapse and adversarial abuse. Learn how to secure your AI-powered systems.

5 min read
zero-dayadobe-readerwordpress

Zero-Day Exploits Hit Adobe Reader & WordPress

Critical zero-day vulnerabilities in Adobe Reader and WordPress are being actively exploited, posing significant risks to users and organizations. These exploits require immediate attention to prevent malicious attacks.

5 min read
zero-dayadobe-readerwordpress

Zero-Day Threats Hit Adobe and WordPress

Critical zero-day vulnerabilities are being exploited in Adobe Reader and the Ninja Forms File Uploads premium add-on for WordPress, posing significant risks to various industries. These threats allow hackers to execute remote code and compromise systems using malicious PDF documents and arbitrary file uploads.

5 min read
black digital device at 19 00
zero-dayransomwarecritical-infrastructure

Critical Flaws in Fortinet and Next.js Under Active Exploitation

Active exploitation of critical flaws in Fortinet and React2Shell, ransomware attacks on critical infrastructure, and significant crypto thefts highlight the urgent need for robust security measures. Read on to understand these threats and how to protect against them.

5 min read
a person using a laptop
zero-daywordpressgrafana

WordPress & Grafana Under Attack

Hackers target Ninja Forms vulnerability to takeover WordPress sites, while GrafanaGhost attackers leak enterprise data through AI components. Learn how to protect your sites and data from these emerging threats.

4 min read
a statue of a person with glasses
zero-dayransomwaremedusa-ransomware

Zero-Day Attacks Surge with Medusa Ransomware

A surge in zero-day exploitation is facilitating high-velocity Medusa ransomware attacks, while the Storm-1175 threat actor targets vulnerable systems. Thousands of zero-day flaws have been discovered across major systems, and a maximum-severity vulnerability in Flowise is being exploited for remote code execution.

critical
6 min read
a close up of a clock on a computer screen
zero-dayremote-code-executioncritical-infrastructure

Zero-Day Vulnerabilities Under Active Exploitation

Multiple zero-day vulnerabilities are being actively exploited, including a critical flaw in Ivanti Endpoint Manager Mobile and 13-year-old bugs in Apache ActiveMQ Classic and Flowise. These vulnerabilities pose significant risks to federal enterprises and other organizations.

critical
3 min read
a close up of a typewriter with a piece of paper on it
social-engineeringemerging-threatssupply-chain

Industrialized Social Engineering on the Rise

Sophisticated social engineering attacks are becoming increasingly industrialized, posing significant threats to maintainers and users of popular packages. Recent high-profile hacks demonstrate the patience and sophistication of certain threat actors.

5 min read
a statue of a person with glasses
zero-dayransomwaremedusa-ransomware

Storm-1175 Threat Actor Exploits Zero-Days

China-linked Storm-1175 threat actor exploits zero-day and N-day vulnerabilities to deploy Medusa ransomware, posing a significant threat to internet-facing systems. Organizations must ensure their systems are up-to-date and securely configured to mitigate potential attacks.

4 min read
A combination lock rests on a computer keyboard.
zero-dayransomwarewindows

Medusa Ransomware Zero-Day Attacks

Medusa ransomware affiliate linked to zero-day attacks, posing a significant risk to organizations. Microsoft has identified Storm-1175 as the actor behind Medusa payloads, highlighting the need for timely vulnerability remediation and robust security measures.

4 min read
a laptop computer sitting on top of a wooden table
ransomwarezero-daywindows

Qilin and Warlock Ransomware Threats Escalate

Qilin and Warlock ransomware operations are using vulnerable drivers to disable over 300 EDR tools, posing a significant threat to cybersecurity. Learn about the emerging threats and techniques used by these ransomware groups.

5 min read
a close up of a computer chip with the letter l on it
linux-vulnerabilitysecurity-researchpatch-management

23-Year Old Linux Vulnerability Discovered

A hidden Linux vulnerability was recently discovered after 23 years, highlighting the importance of continuous security research and testing. This finding underscores the potential for unknown vulnerabilities in widely used software and emphasizes the need for vigilant patch management.

5 min read
malicious-packagesnpm-vulnerabilitiesfortinet

Malicious npm Packages and Fortinet Vulnerability Exploited

Discover how malicious npm packages exploited Redis and PostgreSQL to deploy persistent implants, and learn about the critical Fortinet vulnerability patched in FortiClient EMS. Understand the risks of privilege escalation and unauthorized access.

critical
6 min read
two gray padlock on pink surface
supply-chainzero-dayprivilege-escalation

Supply Chain Under Siege

A high-severity privilege escalation vulnerability in OpenClaw and the unveiling of Chainguard's Factory 2.0 platform highlight the importance of securing the software supply chain, as seen in The Claude source code leak. Learn about the key threats and takeaways to protect your organization.

high
4 min read
Account preferences screen with verification prompt
zero-daycredential-harvestingnext-js

CVE-2025-55182 Exploited to Steal Sensitive Data

Cybersecurity experts warn of active exploitation of CVE-2025-55182, a critical vulnerability that can be used to steal sensitive data and gain unauthorized access to systems. This large-scale credential harvesting operation has affected 766 Next.js hosts, highlighting the need for prompt patching and security updates.

critical
4 min read
person using laptop computers
critical-infrastructurevulnerabilitiesremote-code-execution

Critical Infrastructure Under Siege

Vulnerabilities in critical infrastructure pose significant risks, with ShareFile flaws and Hitachi Energy's Ellipse product under attack. Emerging threats like CrystalRAT malware and Casbaneiro bank trojan also threaten security. Learn about the key threats and how to protect yourself.

critical
4 min read
Hacker in hoodie working on multiple computer screens
zero-dayexploitationtargeted-attacks

Zero-Day Exploits Hit Mercor and TrueConf

Recent cyberattacks on Mercor and TrueConf highlight the active exploitation of zero-day vulnerabilities in targeted campaigns. Threat actors are using these exploits for reconnaissance, privilege escalation, and payload execution, posing significant risks to organizations. This article provides an overview of the threats and recommendations for mitigation.

5 min read
black and red laptop computer
zero-daymalwarephishing

Zero-Day Exploits Hit TrueConf Servers and Banking Systems

Hackers exploit zero-day vulnerability in TrueConf conference servers to push malicious updates, while a phishing campaign targets Latin America and Europe with Windows banking trojans like Casbaneiro. These attacks highlight the ongoing threat of zero-day exploits and social engineering.

4 min read
black flat screen computer monitor
zero-daymalwaregithub

Claude Code Leak Sparks Malware Fears

The recent Claude Code source code leak has led to the exploitation of a critical vulnerability, allowing threat actors to deliver Vidar information-stealing malware via fake GitHub repositories. This poses significant risks to users and highlights the importance of swift security reviews and patches.

3 min read
zero-dayremote-code-executionfreebsd

Critical Vulnerabilities Under Active Exploitation

Active exploitation of critical vulnerabilities in FreeBSD and F5 BIG-IP APM instances poses a significant threat to systems. Over 14,000 F5 BIG-IP APM instances remain exposed to RCE attacks, while a full FreeBSD remote kernel RCE with root shell has been disclosed.

high
4 min read
icon
cloud-securityai-related-threatszero-day

Vertex AI Vulnerability Exposes Google Cloud

A security flaw in Google Cloud's Vertex AI platform could allow AI agents to be weaponized for unauthorized access to sensitive data. Researchers demonstrated how attackers can exploit this vulnerability to steal data and break into restricted cloud infrastructure.

5 min read
a close up of a computer chip with a tick symbol on it
zero-daycryptocurrency-hacksgovernment-networks

Crypto Exchange Hacks & Government Cyberattacks Surge

Cryptocurrency exchange hacks and cyberattacks on government networks are intensifying, with $53 million stolen from Uranium Finance and TrueConf zero-day exploits targeting Southeast Asian governments. Latin American governments face disruptive attacks and probes.

high
3 min read
a computer screen with a quote on it
ai-driven-codeappsecapplication-security

AI-Driven Code Surge Redefines AppSec

The surge in AI-driven code is forcing a rethink of application security practices, with evolving threats and new vulnerabilities emerging. Learn how to evaluate AI SOC agents and adapt to the changing AppSec landscape.

4 min read
black and red screen display
vulnerabilitieszero-daycritical-infrastructure

Critical Flaws Exposed in Anritsu, Cisco, and Telegram

Multiple high-severity vulnerabilities have been discovered in Anritsu Remote Spectrum Monitor, Cisco source code, and a critical no-click flaw in Telegram. These threats pose significant risks to communications, defense, and emergency services. Understanding these vulnerabilities is crucial for proactive defense.

4 min read
zero-daycitrix-netscalerf5-big-ip

Citrix & F5 Under Attack

Critical vulnerabilities in Citrix NetScaler and F5 BIG-IP are being exploited, allowing attackers to gain administrative access and deploy webshells. Organizations using these products must patch immediately to prevent attacks.

3 min read
a couple of pieces of luggage sitting on top of each other
zero-dayremote-code-executiondenial-of-service

Critical Exploits Hit Fortinet & F5 BIG-IP

Organizations face significant threats as critical vulnerabilities in Fortinet's FortiClient EMS and F5 BIG-IP are being actively exploited, potentially leading to remote code execution or denial-of-service conditions. Immediate action is required to patch these flaws.

3 min read
red padlock on black computer keyboard
malicious-implantszero-daychatgpt-vulnerability

New Malicious Implants Emerge

A newly identified malicious implant named RoadK1ll enables threat actors to move quietly through networks, while a vulnerability in OpenAI's ChatGPT allowed sensitive data exfiltration. These findings highlight the ongoing efforts of threat actors to develop new tools and techniques.

3 min read
a close up of a padlock on a wooden fence
supply-chainzero-daywindows

Telnyx Targeted in TeamPCP Supply Chain Attack

Telnyx faces a high-severity supply chain attack as malicious SDK versions are uploaded to PyPI, affecting Windows, macOS, and Linux. This incident highlights the importance of securing software supply chains.

5 min read
man wearing black hooded jacket and holding smartphone white taking close-up selfie
targeted-attacksiosmobile-security

iOS Under Siege

A high-severity targeted email campaign is leveraging the DarkSword exploit kit to target iOS devices, attributed to Russian state-sponsored threat group TA446. Organizations must be aware of the potential for targeted attacks on their mobile devices and keep software up-to-date.

4 min read
A wooden block spelling cybersec on a table
zero-daywordpresscitrix-netscaler

WordPress and Citrix NetScaler Vulnerabilities Under Active Exploitation

High-severity vulnerabilities in WordPress plugins and Citrix NetScaler are being actively exploited, putting over 500,000 websites and critical infrastructure at risk. Administrators must prioritize patching to prevent exploitation.

4 min read
black steering wheel in car
automotive-cybersecurityconnected-vehiclesautonomous-vehicles

Automotive Cybersecurity Threats Rise

The cybersecurity of vehicles is under threat due to the rise of connected and autonomous vehicles, introducing new vulnerabilities. As technology advances in the automotive industry, the need for robust cybersecurity measures grows. Readers should be aware of the evolving threat landscape and take necessary precautions.

4 min read
red padlock on black computer keyboard
phishingai-powered-attacksemerging-threats

AI-Powered Phishing on the Rise

Emerging threats in cybersecurity include AI-powered phishing campaigns and new attack techniques from SANS Institute's top 5 most dangerous threats. These sophisticated attacks can evade traditional security controls, posing significant risks to individuals and organizations. Staying informed is crucial to mitigating these threats.

4 min read
a close up of a typewriter with a paper on it
critical-infrastructurequantum-computingencryption

Critical Infrastructure Under Siege

A critical vulnerability in WAGO industrial switches threatens energy and transportation systems, while Google warns of quantum computers potentially hacking encrypted systems by 2029. Learn how to protect your organization from these emerging threats.

critical
3 min read
A laptop computer sitting on top of a desk
nation-state-malwarespywarezero-day

Nation-State Malware Upgrades

Nation-state malware is evolving with China's APT Red Menshen upgrading its BPFdoor malware, and exploit kits like Coruna and DarkSword spreading on the Dark Web. Intermediaries are driving the global spyware market expansion, making it harder for organizations to defend themselves.

4 min read
a cell phone with a lit up screen in the dark
zero-dayioschrome

Zero-Day Exploits and Cybercrime Takedowns

Critical zero-day vulnerabilities in iOS and Chrome are being exploited, while cybercrime forums are being taken down. Learn about the latest threats and how to protect yourself.

4 min read
zero-dayremote-code-executioncisa

CISA Orders Patching of Actively Exploited n8n Vulnerability

CISA has ordered federal agencies to patch the actively exploited n8n vulnerability, indicating a significant threat to government systems. The vulnerability allows for remote code execution, making it a high-priority patch for affected systems. Prompt patching is essential to prevent exploitation and protect against potential attacks.

4 min read
a hand holding a phone
zero-dayioswindows

Critical Patches Released for iOS and Windows

Apple and Microsoft have released critical security patches to prevent exploitation of known vulnerabilities. Users are advised to update their software immediately to protect against potential attacks.

4 min read
a laptop computer sitting on top of a desk
zero-dayransomwarelinux

Critical n8n and KadNap Exploits, Ransomware Surge

Active exploitation of n8n and KadNap malware poses critical threats, while ransomware attacks target healthcare organizations and critical infrastructure. Stay informed on the latest cybersecurity threats and take action to protect your systems.

critical
4 min read
a blue and white logo
cloud-securitycritical-infrastructurezero-day

Cloud Resilience Under Fire

The Middle East conflict exposes significant cloud resilience gaps, while major vendors release critical ICS patches. Learn how to protect your infrastructure from emerging threats.

3 min read
gold padlock on blue and white floral door
cloud-securityzero-dayphishing

Cloud Vulnerabilities Under Siege

Hackers are exploiting cloud and software vulnerabilities at an alarming rate, with high-value organizations in Asia being targeted. Malicious code and phishing campaigns are also on the rise, highlighting the need for rapid patching and vigilance. Adobe has patched 80 vulnerabilities across eight products, and cybercriminals are impersonating city officials to steal permit payments.

5 min read
a desk with several monitors
critical-infrastructureransomwarezero-day

Critical Infrastructure Under Siege

Critical infrastructure faces significant threats from vulnerabilities, ransomware, and nation-state attacks. Recent discoveries include Honeywell IQ4x BMS Controller and Apeman Cameras vulnerabilities, as well as new malware and threat actor activity. Learn how to protect your systems.

critical
5 min read
zero-dayvulnerabilitieschrome-extensions

Google Looker Studio Vulnerabilities Exposed

High-severity vulnerabilities in Google Looker Studio and malicious Chrome extensions pose significant threats, while evolving malware and new security platforms highlight the cat-and-mouse game in cybersecurity. Learn about the latest developments and how to protect yourself.

4 min read
A couple of padlocks attached to a fence
zero-dayauthentication-bypassendpoint-security

Critical Ivanti Flaw Exploited, APT28 Espionage Campaign Uncovered

A critical flaw in Ivanti Endpoint Manager is being actively exploited, while APT28's customized Covenant malware is used for long-term espionage. Learn about the threats and how to protect yourself.

4 min read
a man sitting in front of multiple monitors
iot-securityzero-dayindustrial-control-systems

MyFirst Kids Watch Hacked Amidst Rising Cyber Threats

The MyFirst Kids Watch has been hacked, allowing access to its camera and microphone. This incident is part of a larger landscape of cyber threats, including fake Claude Code install guides, Iran's cyber-kinetic war doctrine, and vulnerabilities in Rockwell industrial control systems. These threats underscore the importance of cybersecurity in protecting sensitive information and physical assets.

3 min read
black LED keyboard
cybercrimephishing-as-a-servicecryptocurrency

Cybercrime Surges with $46M Crypto Heist and Phishing-as-a-Service Takedown

A recent surge in cybercrime includes a $46 million cryptocurrency heist and the takedown of a phishing-as-a-service operation. Learn about the latest threats and how to protect yourself.

5 min read
red padlock on black computer keyboard
state-sponsored-attacksvulnerabilitiesexploits

State-Sponsored Threats and Vulnerabilities Plague Cybersecurity

State-sponsored threat actors and vulnerabilities pose significant risks to cybersecurity. Chinese state hackers target telcos, while vulnerabilities in Avira antivirus and WordPress plugins are exploited. Learn about the key threats and how to protect yourself.

6 min read
A cell phone sitting on top of a keyboard
zero-dayiosgithub

Zero-Day Exploits Target iOS and GitHub Users

Critical zero-day vulnerabilities are being actively exploited, targeting iOS users and GitHub repositories. Over 100 GitHub repositories are distributing the BoryptGrab stealer, while CISA has added iOS flaws from the Coruna exploit kit to the KEV list. Users must take immediate action to protect themselves.

3 min read
red padlock on gray wire
zero-daycloud-securitynetworking-vulnerabilities

Critical Cloud and Networking Vulnerabilities Under Active Exploitation

Multiple critical vulnerabilities in cloud and networking products are being actively exploited, putting organizations at risk. VMware Aria Operations and Cisco SD-WAN products are among those affected, with patches available for some but not all vulnerabilities. Administrators must take immediate action to protect their networks.

4 min read
A laptop computer sitting on top of a desk
zero-dayai-powered-malwareinfo-stealing-malware

Zero-Day Vulnerabilities and AI-Powered Threats

Critical zero-day vulnerabilities in FreeScout and VMware Aria Operations, along with AI-powered malware and info-stealing threats, pose significant risks to organizations. Immediate action is required to patch and mitigate these threats.

4 min read
Apple logo
ios-exploitzero-dayiphone-hacking

Coruna iOS Exploit Kit Under Active Exploitation

The Coruna iOS exploit kit is being actively exploited, targeting iOS devices with 23 exploits across five chains. Originally used by nation-state actors, it now appears in broader criminal campaigns. Learn how to protect your devices.

4 min read
A picture of a vase with a tree in it
phishingbrowser-securitysecurity-research

Phishing Sites Slip Past Google Safe Browsing

Recent reports reveal Google Safe Browsing misses 84% of confirmed phishing sites, while the 2026 Browser Data report exposes major enterprise security blind spots. These findings highlight the need for improved detection capabilities and ongoing security research to combat emerging threats.

3 min read
a person sitting at a desk with a computer
zero-daycybercrimephishing

Zero-Days and Cybercrime: Emerging Threats

A possible US government iPhone-hacking toolkit has been leaked, while half of 2025's exploited zero-days targeted enterprises. Meanwhile, law enforcement efforts have led to the dismantling of a major phishing platform and the breakup of an African cybercrime syndicate.

4 min read
black flat screen tv showing 20 00
ai-powered-attackszero-daynetwork-security

AI-Powered Attacks Surge

The emergence of AI-powered attack tools poses a significant threat to cybersecurity. Recent breaches, including the compromise of Fortinet FortiGate firewalls, highlight the dangers of these advanced attacks. Learn how to adapt your defenses against this new frontier in cybersecurity threats.

3 min read
photo of computer cables
zero-daycybercrimecisco

Cisco Firewall Vulnerabilities and Leakbase Takedown

Cisco has released patches for high-severity vulnerabilities in its Secure Firewall Management Center, while the FBI and European law enforcement agencies have taken down the Leakbase cybercrime forum. Learn about the key threats and recommendations for protection.

4 min read
remote-code-executionvmware-aria-operationscritical-infrastructure

VMware Aria Operations RCE Flaw Under Active Exploitation

A critical VMware Aria Operations vulnerability is being exploited in attacks, allowing for remote code execution. This poses a significant threat to affected systems, and immediate action is required to patch the flaw. The US Cybersecurity and Infrastructure Security Agency has added the vulnerability to its Known Exploited Vulnerabilities catalog.

high
4 min read
A man holding a cell phone in his hand
zero-dayandroidcyber-conflict

Android Zero-Day Under Attack

A critical zero-day vulnerability in Android's Qualcomm component is being exploited, while Israel and Iran engage in a cyber conflict. Learn about the threats and how to protect yourself.

high
4 min read
a blue and white logo
zero-dayransomwarecloud-security

Critical Threats: AWS Drone Strikes, Ransomware, and Zero-Days

AWS data centers face drone strikes, major ransomware attacks hit healthcare and gaming, and zero-day vulnerabilities are exploited in the wild. Stay ahead of these critical threats with our latest analysis.

high
3 min read
blue padlock
emerging-threatssurveillancephishing

New Surveillance Threats Emerge

Researchers uncover methods to track cars via tire sensors, while Microsoft warns of OAuth redirect abuse and a new attack hijacks OpenClaw instances. These emerging threats highlight the need for increased security measures.

3 min read
man in black and orange jacket with orange and black backpack
zero-dayvulnerabilitygithub-copilot

GitHub Copilot and OpenClaw Under Attack

High-severity vulnerabilities in GitHub Copilot and OpenClaw pose significant risks to users. Learn about the threats and how to protect yourself.

5 min read
green white and red flag on pole during daytime
zero-dayiranian-cyberattackschrome-vulnerabilities

Iranian Cyberattacks & Chrome Zero-Days

The UK warns of heightened Iranian cyberattack risks, while Chrome vulnerabilities put thousands at risk. Data breaches and cybercrime continue to threaten global security.

high
4 min read
zero-dayai-securitycloud-security

Zero-Day AI Threats and Cloud Security Updates

Critical zero-day vulnerabilities in AI systems pose significant threats, while cloud security enhancements offer new protections. Learn about the latest developments and how to stay secure.

5 min read
laptop compute displaying command prompt
zero-dayransomwareazure

Chrome Zero-Day & Azure Ransomware Attacks

A critical Google Chrome zero-day vulnerability is being exploited, while a Microsoft Azure vulnerability is being used by ransomware attackers. Learn about these threats and how to protect yourself.

4 min read
photo of computer cables
zero-daycisco-sd-wandeveloper-targeting

Cisco SD-WAN Zero-Day Exploited, Devs Targeted, ICS Vulnerabilities Found

A critical Cisco SD-WAN zero-day is being exploited, while developers are being targeted by malicious campaigns and industrial control systems are vulnerable to new threats. Learn how to protect yourself and your organization from these emerging threats.

4 min read
photo of computer cables
zero-daycisco-sd-wandata-breach

Cisco SD-WAN Zero-Day Under Active Exploitation

A critical zero-day vulnerability in Cisco SD-WAN has been exploited since 2023, allowing attackers to bypass authentication and gain administrative access. Meanwhile, a data breach at European DIY chain ManoMano has affected 38 million customers, highlighting the importance of securing third-party services and patching vulnerabilities.

5 min read
photo of computer cables
zero-daycisco-sd-wanuat-10027

Cisco SD-WAN Zero-Day Exploited, UAT-10027 Hits US Education

A critical Cisco SD-WAN zero-day is being exploited, while UAT-10027 targets US education and healthcare. EV2GO and SWITCH EV charging systems also have severe vulnerabilities.

4 min read
white and black electric wires
zero-daycritical-vulnerabilitiescharging-infrastructure

Critical Charging Infrastructure Vulnerabilities and Cisco SD-WAN Zero-Day Exploit

Multiple critical vulnerabilities have been discovered in charging infrastructure systems, while a zero-day exploit has been found in Cisco SD-WAN. These threats highlight the importance of patching and keeping software up to date to prevent large-scale denial of service, privilege escalation, and corruption of data.

4 min read
photo of computer cables
zero-dayindustrial-control-systemscisco-ios

Critical Industrial Control System Vulnerabilities Under Active Exploitation

Multiple vulnerabilities in Yokogawa Centum and Exaopc products are under active exploitation, allowing attackers to gain control of industrial control systems. Cisco IOS and IOS XE software patches are also available to prevent further exploitation. Immediate action is required to patch these vulnerabilities.

4 min read
text
zero-dayrouter-vulnerabilitiesstate-sponsored-hacks

Critical Router Flaws and State-Sponsored Hacks Expose Networks

Zero-day vulnerabilities in Juniper Networks PTX and Zyxel routers allow for full router takeover, while Chinese cyberspies breach telecom firms and government agencies. Ransomware and cybercrime threats also persist.

5 min read
icon
zero-dayvulnerabilitiesmalicious-campaigns

Critical Vulnerabilities and Malicious Campaigns Targeting Multiple Sectors

Newly disclosed vulnerabilities in software and hardware, along with malicious campaigns targeting specific sectors, pose significant threats to cybersecurity. Readers should be aware of these risks and take necessary precautions to protect themselves.

3 min read
An unlocked padlock rests on a computer keyboard.
industrial-control-systemscybersecurity-researchvulnerabilities

Industrial Control System Vulnerabilities Pose Critical Threats

Recent vulnerabilities in industrial control systems highlight the need for ongoing security maintenance and updates. Cybersecurity research emphasizes the importance of awareness and best practices to ensure business continuity.

5 min read
text
critical-infrastructurezero-daybotnet

Critical Infrastructure Under Fire

Johnson Controls Frick Controls Quantum HD vulnerabilities pose a high risk to critical infrastructure, while the Aeternum botnet loader emerges as a new threat. Learn about these emerging threats and how to protect against them.

4 min read
woman in black long sleeve shirt using laptop computer
ransomwarezero-dayhealthcare

Other Notable Threats Emerge as Ransomware and Zero-Days Persist

A previously undocumented threat activity cluster targets US education and healthcare, while Zyxel patches a critical vulnerability in its routers. Meanwhile, ransomware attacks and zero-day exploits continue to pose significant threats.

4 min read
a group of colorful chairs
zero-daycritical-infrastructurebotnet

Zero-Day Attacks Surge: Aeternum Botnet, Critical Infrastructure Vulnerabilities, and Malicious Developer Campaigns

A surge in zero-day attacks, including the Aeternum botnet and critical infrastructure vulnerabilities, poses significant threats to global security. Meanwhile, malicious campaigns target developers and financial sectors, highlighting the need for enhanced cybersecurity measures.

4 min read
zero-daycisco-sd-wanchina-linked-espionage

Critical Cisco SD-WAN Flaw Exploited, China-Linked Espionage Uncovered, and EV Charging Hacks

A critical vulnerability in Cisco SD-WAN is being exploited, a Chinese cyber espionage campaign has been disrupted by Google, and vulnerabilities have been found in electric vehicle charging infrastructure. These threats pose significant risks to network security, intellectual property, and critical infrastructure.

5 min read
photo of computer cables
zero-daycisco-sd-wandeveloper-targeting

Cisco SD-WAN Under Attack

Multiple Cisco SD-WAN vulnerabilities are being actively exploited, while developers and IT systems face targeted attacks. Learn about the key threats and how to protect yourself.

3 min read
text
zero-dayransomwarecritical-infrastructure

Critical Cisco SD-WAN Vulnerabilities Exploited

Multiple critical vulnerabilities in Cisco SD-WAN products are being exploited, allowing attackers to gain admin access and potentially disrupt critical infrastructure. Ransomware attacks are also on the rise, with a recent surge in attack numbers despite decreased payments.

4 min read
photo of computer cables
zero-daycisco-sd-wancyber-espionage

Cisco SD-WAN Zero-Day Exploited, Chinese Cyber Espionage Disrupted

A critical zero-day vulnerability in Cisco SD-WAN is being actively exploited by attackers, while Google disrupts a Chinese cyber espionage campaign targeting telecoms and governments worldwide. Learn about the key threats and how to protect your organization.

4 min read
Workers at computers in a modern office setting
zero-daysd-wansupply-chain

Cisco SD-WAN Zero-Day Exploited, Devs Targeted, and Major Breaches

A critical Cisco SD-WAN zero-day is under active exploitation, while developers face targeted attacks, and major data breaches hit millions of users. Learn about the threats and how to protect yourself.

5 min read
photo of computer cables
zero-daycisco-sd-wanauthentication-bypass

Cisco SD-WAN Zero-Day Under Active Exploitation

A critical zero-day vulnerability in Cisco SD-WAN is being actively exploited, allowing attackers to bypass authentication and gain administrative access. This vulnerability affects Cisco Catalyst SD-WAN Controller and Manager, with a patch available. Readers should prioritize updating their systems to prevent exploitation.

4 min read
photo of computer cables
zero-daycisco-sd-wanai-threats

Cisco SD-WAN Zero-Day Exploited, AI Threats Rise

Critical Cisco SD-WAN vulnerabilities are under active exploitation, while malicious AI-related activities and targeted attacks on critical infrastructure pose significant threats to global security. Learn about the key risks and how to protect your organization.

4 min read
photo of computer cables
zero-daycisco-sd-wancyber-espionage

Critical Cisco SD-WAN Bugs Exploited Amidst Zero-Days and AI Threats

Active exploitation of critical Cisco SD-WAN vulnerabilities, alongside zero-day exploits in cyber espionage campaigns and malicious AI-generated code attacks, pose significant threats to global cybersecurity. Learn about the key risks and necessary mitigation strategies.

4 min read
A man sitting in front of a computer monitor
zero-dayremote-code-executionwindows

Critical Vulnerabilities Exposed in Trend Micro, Juniper, and Zyxel Products

Newly disclosed vulnerabilities in Trend Micro, Juniper Networks, and Zyxel products pose significant risks to users. ICS and energy sector vulnerabilities are also highlighted, emphasizing the need for urgent patches and security measures.

4 min read
a computer keyboard with a padlock on top of it
data-breachzero-dayinsider-threats

CarGurus Breach & Zero-Day Sales Rock Cybersecurity

A massive data breach at CarGurus exposed 12.4 million accounts, while a former defense contractor employee was jailed for selling zero-days to a Russian broker. Learn about these critical threats and how to protect yourself.

5 min read
photo of computer cables
zero-dayransomwarecisco-sd-wan

Cisco SD-WAN Zero-Day Exploited, Plus Ransomware and SolarWinds Patches

A critical zero-day vulnerability in Cisco SD-WAN is being actively exploited, while the Lazarus Group launches a Medusa ransomware campaign and SolarWinds patches critical Serv-U flaws. Learn about these threats and how to protect your organization.

3 min read
photo of computer cables
zero-daycisco-sd-wanzyxel-routers

Critical Cisco and Zyxel Vulnerabilities Under Attack

Multiple critical vulnerabilities in Cisco SD-WAN and Zyxel routers are being actively exploited, posing significant risks to organizations. Learn about the threats and how to protect your networks.

5 min read
A laptop computer sitting on top of a desk
nation-state-attacksransomwarezero-day

Nation-State Cyberattacks Surge

MuddyWater, APT28, and Lazarus Group launch targeted attacks on organizations worldwide. Learn about the latest nation-state sponsored cyber threats and how to protect your organization.

4 min read
scrabble tiles spelling security on a wooden surface
supply-chain-attackszero-daygithub-vulnerabilities

RoguePilot & SANDWORM_MODE Threats Uncovered

High-severity vulnerabilities in GitHub Codespaces and npm packages have been discovered, posing significant risks to developers and the software supply chain. The RoguePilot flaw and SANDWORM_MODE campaign highlight the need for vigilance in AI-driven development tools and open-source dependencies.

4 min read
black laptop computer with white paper
zero-dayransomwaredata-breaches

Zero-Day Vulnerability Under Active Exploitation

A critical zero-day vulnerability is being actively exploited, while significant data breaches and new malware campaigns pose high risks to users. Immediate action is necessary to prevent further exploitation.

4 min read
a desk with several monitors
zero-dayransomwarecritical-infrastructure

Zero-Days & Ransomware: Twin Threats to US Security

The Lazarus Group's Medusa ransomware attacks and active exploitation of zero-day vulnerabilities pose significant threats to national security. Recent incidents involve a former US defense contractor employee selling zero-day exploits to a Russian broker and the targeting of US healthcare organizations with Medusa ransomware.

5 min read
red padlock on black computer keyboard
zero-dayransomwaresupply-chain-attacks

Critical Vulnerabilities Under Attack

Multiple critical vulnerabilities are being actively exploited by threat actors, including the ShinyHunters extortion gang and North Korean state-backed hackers. New malware families and supply chain attacks are also on the rise, targeting healthcare organizations and financial institutions.

4 min read
brown padlock on black computer keyboard
zero-dayransomwaresupply-chain

SolarWinds & FortiGate Under Attack

Critical vulnerabilities in SolarWinds and FortiGate pose significant risks, while recent ransomware attacks and newly disclosed threats demand immediate attention from security teams. Learn about the key threats and how to protect your organization.

4 min read
ProjectZyper AI ProjectZyper AI

AI-powered cybersecurity threat intelligence. Aggregated, analyzed, and published daily.

Powered by AI

Status

Live threat monitor Monitoring threat feeds — updated hourly

AI-generated content. Verify critical information independently.

© 2026 ProjectZyper AI. All rights reserved.