Articles tagged: zero-day
95 articles found

Critical Infrastructure Under Siege
Targeted attacks on critical infrastructure are escalating, with Juniper Networks patching dozens of vulnerabilities and Russia's APT28 spying on global organizations. Learn about the key threats and how to protect your systems.

GlassWorm Campaign Evolves with Zig Dropper
The GlassWorm campaign has introduced a new Zig dropper to infect developer IDEs, while Russian submarine activity near undersea cables and a Windows zero-day vulnerability pose significant threats. Learn about these emerging threats and how to protect against them.

Marimo & Chrome Under Attack
Critical vulnerabilities in Marimo and Chrome pose significant risks to users, with exploits already reported in the wild. Learn about the technical details and implications of these threats.

Notable Security Incidents and Research
Recent security incidents include Cloudflare's post-quantum security roadmap, zero-day exploits for the human mind, and backdoored updates for WordPress and Joomla plugins. These threats highlight the need for long-term cryptographic planning and awareness of social engineering tactics.

AI Security Risks Exposed
Recent attacks on Apple Intelligence and Grafana highlight the growing concern of AI-related security risks. Enterprises are deploying AI without fully understanding the risks, including model collapse and adversarial abuse. Learn how to secure your AI-powered systems.
Zero-Day Exploits Hit Adobe Reader & WordPress
Critical zero-day vulnerabilities in Adobe Reader and WordPress are being actively exploited, posing significant risks to users and organizations. These exploits require immediate attention to prevent malicious attacks.
Zero-Day Threats Hit Adobe and WordPress
Critical zero-day vulnerabilities are being exploited in Adobe Reader and the Ninja Forms File Uploads premium add-on for WordPress, posing significant risks to various industries. These threats allow hackers to execute remote code and compromise systems using malicious PDF documents and arbitrary file uploads.

Critical Flaws in Fortinet and Next.js Under Active Exploitation
Active exploitation of critical flaws in Fortinet and React2Shell, ransomware attacks on critical infrastructure, and significant crypto thefts highlight the urgent need for robust security measures. Read on to understand these threats and how to protect against them.

WordPress & Grafana Under Attack
Hackers target Ninja Forms vulnerability to takeover WordPress sites, while GrafanaGhost attackers leak enterprise data through AI components. Learn how to protect your sites and data from these emerging threats.

Zero-Day Attacks Surge with Medusa Ransomware
A surge in zero-day exploitation is facilitating high-velocity Medusa ransomware attacks, while the Storm-1175 threat actor targets vulnerable systems. Thousands of zero-day flaws have been discovered across major systems, and a maximum-severity vulnerability in Flowise is being exploited for remote code execution.

Zero-Day Vulnerabilities Under Active Exploitation
Multiple zero-day vulnerabilities are being actively exploited, including a critical flaw in Ivanti Endpoint Manager Mobile and 13-year-old bugs in Apache ActiveMQ Classic and Flowise. These vulnerabilities pose significant risks to federal enterprises and other organizations.

Industrialized Social Engineering on the Rise
Sophisticated social engineering attacks are becoming increasingly industrialized, posing significant threats to maintainers and users of popular packages. Recent high-profile hacks demonstrate the patience and sophistication of certain threat actors.

Storm-1175 Threat Actor Exploits Zero-Days
China-linked Storm-1175 threat actor exploits zero-day and N-day vulnerabilities to deploy Medusa ransomware, posing a significant threat to internet-facing systems. Organizations must ensure their systems are up-to-date and securely configured to mitigate potential attacks.

Medusa Ransomware Zero-Day Attacks
Medusa ransomware affiliate linked to zero-day attacks, posing a significant risk to organizations. Microsoft has identified Storm-1175 as the actor behind Medusa payloads, highlighting the need for timely vulnerability remediation and robust security measures.

Qilin and Warlock Ransomware Threats Escalate
Qilin and Warlock ransomware operations are using vulnerable drivers to disable over 300 EDR tools, posing a significant threat to cybersecurity. Learn about the emerging threats and techniques used by these ransomware groups.

23-Year Old Linux Vulnerability Discovered
A hidden Linux vulnerability was recently discovered after 23 years, highlighting the importance of continuous security research and testing. This finding underscores the potential for unknown vulnerabilities in widely used software and emphasizes the need for vigilant patch management.
Malicious npm Packages and Fortinet Vulnerability Exploited
Discover how malicious npm packages exploited Redis and PostgreSQL to deploy persistent implants, and learn about the critical Fortinet vulnerability patched in FortiClient EMS. Understand the risks of privilege escalation and unauthorized access.

Supply Chain Under Siege
A high-severity privilege escalation vulnerability in OpenClaw and the unveiling of Chainguard's Factory 2.0 platform highlight the importance of securing the software supply chain, as seen in The Claude source code leak. Learn about the key threats and takeaways to protect your organization.

CVE-2025-55182 Exploited to Steal Sensitive Data
Cybersecurity experts warn of active exploitation of CVE-2025-55182, a critical vulnerability that can be used to steal sensitive data and gain unauthorized access to systems. This large-scale credential harvesting operation has affected 766 Next.js hosts, highlighting the need for prompt patching and security updates.

Critical Infrastructure Under Siege
Vulnerabilities in critical infrastructure pose significant risks, with ShareFile flaws and Hitachi Energy's Ellipse product under attack. Emerging threats like CrystalRAT malware and Casbaneiro bank trojan also threaten security. Learn about the key threats and how to protect yourself.

Zero-Day Exploits Hit Mercor and TrueConf
Recent cyberattacks on Mercor and TrueConf highlight the active exploitation of zero-day vulnerabilities in targeted campaigns. Threat actors are using these exploits for reconnaissance, privilege escalation, and payload execution, posing significant risks to organizations. This article provides an overview of the threats and recommendations for mitigation.

Zero-Day Exploits Hit TrueConf Servers and Banking Systems
Hackers exploit zero-day vulnerability in TrueConf conference servers to push malicious updates, while a phishing campaign targets Latin America and Europe with Windows banking trojans like Casbaneiro. These attacks highlight the ongoing threat of zero-day exploits and social engineering.

Claude Code Leak Sparks Malware Fears
The recent Claude Code source code leak has led to the exploitation of a critical vulnerability, allowing threat actors to deliver Vidar information-stealing malware via fake GitHub repositories. This poses significant risks to users and highlights the importance of swift security reviews and patches.
Critical Vulnerabilities Under Active Exploitation
Active exploitation of critical vulnerabilities in FreeBSD and F5 BIG-IP APM instances poses a significant threat to systems. Over 14,000 F5 BIG-IP APM instances remain exposed to RCE attacks, while a full FreeBSD remote kernel RCE with root shell has been disclosed.

Vertex AI Vulnerability Exposes Google Cloud
A security flaw in Google Cloud's Vertex AI platform could allow AI agents to be weaponized for unauthorized access to sensitive data. Researchers demonstrated how attackers can exploit this vulnerability to steal data and break into restricted cloud infrastructure.

Crypto Exchange Hacks & Government Cyberattacks Surge
Cryptocurrency exchange hacks and cyberattacks on government networks are intensifying, with $53 million stolen from Uranium Finance and TrueConf zero-day exploits targeting Southeast Asian governments. Latin American governments face disruptive attacks and probes.

AI-Driven Code Surge Redefines AppSec
The surge in AI-driven code is forcing a rethink of application security practices, with evolving threats and new vulnerabilities emerging. Learn how to evaluate AI SOC agents and adapt to the changing AppSec landscape.

Critical Flaws Exposed in Anritsu, Cisco, and Telegram
Multiple high-severity vulnerabilities have been discovered in Anritsu Remote Spectrum Monitor, Cisco source code, and a critical no-click flaw in Telegram. These threats pose significant risks to communications, defense, and emergency services. Understanding these vulnerabilities is crucial for proactive defense.
Citrix & F5 Under Attack
Critical vulnerabilities in Citrix NetScaler and F5 BIG-IP are being exploited, allowing attackers to gain administrative access and deploy webshells. Organizations using these products must patch immediately to prevent attacks.

Critical Exploits Hit Fortinet & F5 BIG-IP
Organizations face significant threats as critical vulnerabilities in Fortinet's FortiClient EMS and F5 BIG-IP are being actively exploited, potentially leading to remote code execution or denial-of-service conditions. Immediate action is required to patch these flaws.

New Malicious Implants Emerge
A newly identified malicious implant named RoadK1ll enables threat actors to move quietly through networks, while a vulnerability in OpenAI's ChatGPT allowed sensitive data exfiltration. These findings highlight the ongoing efforts of threat actors to develop new tools and techniques.

Telnyx Targeted in TeamPCP Supply Chain Attack
Telnyx faces a high-severity supply chain attack as malicious SDK versions are uploaded to PyPI, affecting Windows, macOS, and Linux. This incident highlights the importance of securing software supply chains.

iOS Under Siege
A high-severity targeted email campaign is leveraging the DarkSword exploit kit to target iOS devices, attributed to Russian state-sponsored threat group TA446. Organizations must be aware of the potential for targeted attacks on their mobile devices and keep software up-to-date.

WordPress and Citrix NetScaler Vulnerabilities Under Active Exploitation
High-severity vulnerabilities in WordPress plugins and Citrix NetScaler are being actively exploited, putting over 500,000 websites and critical infrastructure at risk. Administrators must prioritize patching to prevent exploitation.

Automotive Cybersecurity Threats Rise
The cybersecurity of vehicles is under threat due to the rise of connected and autonomous vehicles, introducing new vulnerabilities. As technology advances in the automotive industry, the need for robust cybersecurity measures grows. Readers should be aware of the evolving threat landscape and take necessary precautions.

AI-Powered Phishing on the Rise
Emerging threats in cybersecurity include AI-powered phishing campaigns and new attack techniques from SANS Institute's top 5 most dangerous threats. These sophisticated attacks can evade traditional security controls, posing significant risks to individuals and organizations. Staying informed is crucial to mitigating these threats.

Critical Infrastructure Under Siege
A critical vulnerability in WAGO industrial switches threatens energy and transportation systems, while Google warns of quantum computers potentially hacking encrypted systems by 2029. Learn how to protect your organization from these emerging threats.

Nation-State Malware Upgrades
Nation-state malware is evolving with China's APT Red Menshen upgrading its BPFdoor malware, and exploit kits like Coruna and DarkSword spreading on the Dark Web. Intermediaries are driving the global spyware market expansion, making it harder for organizations to defend themselves.

Zero-Day Exploits and Cybercrime Takedowns
Critical zero-day vulnerabilities in iOS and Chrome are being exploited, while cybercrime forums are being taken down. Learn about the latest threats and how to protect yourself.
CISA Orders Patching of Actively Exploited n8n Vulnerability
CISA has ordered federal agencies to patch the actively exploited n8n vulnerability, indicating a significant threat to government systems. The vulnerability allows for remote code execution, making it a high-priority patch for affected systems. Prompt patching is essential to prevent exploitation and protect against potential attacks.

Critical Patches Released for iOS and Windows
Apple and Microsoft have released critical security patches to prevent exploitation of known vulnerabilities. Users are advised to update their software immediately to protect against potential attacks.

Critical n8n and KadNap Exploits, Ransomware Surge
Active exploitation of n8n and KadNap malware poses critical threats, while ransomware attacks target healthcare organizations and critical infrastructure. Stay informed on the latest cybersecurity threats and take action to protect your systems.

Cloud Resilience Under Fire
The Middle East conflict exposes significant cloud resilience gaps, while major vendors release critical ICS patches. Learn how to protect your infrastructure from emerging threats.

Cloud Vulnerabilities Under Siege
Hackers are exploiting cloud and software vulnerabilities at an alarming rate, with high-value organizations in Asia being targeted. Malicious code and phishing campaigns are also on the rise, highlighting the need for rapid patching and vigilance. Adobe has patched 80 vulnerabilities across eight products, and cybercriminals are impersonating city officials to steal permit payments.

Critical Infrastructure Under Siege
Critical infrastructure faces significant threats from vulnerabilities, ransomware, and nation-state attacks. Recent discoveries include Honeywell IQ4x BMS Controller and Apeman Cameras vulnerabilities, as well as new malware and threat actor activity. Learn how to protect your systems.
Google Looker Studio Vulnerabilities Exposed
High-severity vulnerabilities in Google Looker Studio and malicious Chrome extensions pose significant threats, while evolving malware and new security platforms highlight the cat-and-mouse game in cybersecurity. Learn about the latest developments and how to protect yourself.

Critical Ivanti Flaw Exploited, APT28 Espionage Campaign Uncovered
A critical flaw in Ivanti Endpoint Manager is being actively exploited, while APT28's customized Covenant malware is used for long-term espionage. Learn about the threats and how to protect yourself.

MyFirst Kids Watch Hacked Amidst Rising Cyber Threats
The MyFirst Kids Watch has been hacked, allowing access to its camera and microphone. This incident is part of a larger landscape of cyber threats, including fake Claude Code install guides, Iran's cyber-kinetic war doctrine, and vulnerabilities in Rockwell industrial control systems. These threats underscore the importance of cybersecurity in protecting sensitive information and physical assets.

Cybercrime Surges with $46M Crypto Heist and Phishing-as-a-Service Takedown
A recent surge in cybercrime includes a $46 million cryptocurrency heist and the takedown of a phishing-as-a-service operation. Learn about the latest threats and how to protect yourself.

State-Sponsored Threats and Vulnerabilities Plague Cybersecurity
State-sponsored threat actors and vulnerabilities pose significant risks to cybersecurity. Chinese state hackers target telcos, while vulnerabilities in Avira antivirus and WordPress plugins are exploited. Learn about the key threats and how to protect yourself.

Zero-Day Exploits Target iOS and GitHub Users
Critical zero-day vulnerabilities are being actively exploited, targeting iOS users and GitHub repositories. Over 100 GitHub repositories are distributing the BoryptGrab stealer, while CISA has added iOS flaws from the Coruna exploit kit to the KEV list. Users must take immediate action to protect themselves.

Critical Cloud and Networking Vulnerabilities Under Active Exploitation
Multiple critical vulnerabilities in cloud and networking products are being actively exploited, putting organizations at risk. VMware Aria Operations and Cisco SD-WAN products are among those affected, with patches available for some but not all vulnerabilities. Administrators must take immediate action to protect their networks.

Zero-Day Vulnerabilities and AI-Powered Threats
Critical zero-day vulnerabilities in FreeScout and VMware Aria Operations, along with AI-powered malware and info-stealing threats, pose significant risks to organizations. Immediate action is required to patch and mitigate these threats.

Coruna iOS Exploit Kit Under Active Exploitation
The Coruna iOS exploit kit is being actively exploited, targeting iOS devices with 23 exploits across five chains. Originally used by nation-state actors, it now appears in broader criminal campaigns. Learn how to protect your devices.

Phishing Sites Slip Past Google Safe Browsing
Recent reports reveal Google Safe Browsing misses 84% of confirmed phishing sites, while the 2026 Browser Data report exposes major enterprise security blind spots. These findings highlight the need for improved detection capabilities and ongoing security research to combat emerging threats.

Zero-Days and Cybercrime: Emerging Threats
A possible US government iPhone-hacking toolkit has been leaked, while half of 2025's exploited zero-days targeted enterprises. Meanwhile, law enforcement efforts have led to the dismantling of a major phishing platform and the breakup of an African cybercrime syndicate.

AI-Powered Attacks Surge
The emergence of AI-powered attack tools poses a significant threat to cybersecurity. Recent breaches, including the compromise of Fortinet FortiGate firewalls, highlight the dangers of these advanced attacks. Learn how to adapt your defenses against this new frontier in cybersecurity threats.

Cisco Firewall Vulnerabilities and Leakbase Takedown
Cisco has released patches for high-severity vulnerabilities in its Secure Firewall Management Center, while the FBI and European law enforcement agencies have taken down the Leakbase cybercrime forum. Learn about the key threats and recommendations for protection.
VMware Aria Operations RCE Flaw Under Active Exploitation
A critical VMware Aria Operations vulnerability is being exploited in attacks, allowing for remote code execution. This poses a significant threat to affected systems, and immediate action is required to patch the flaw. The US Cybersecurity and Infrastructure Security Agency has added the vulnerability to its Known Exploited Vulnerabilities catalog.

Android Zero-Day Under Attack
A critical zero-day vulnerability in Android's Qualcomm component is being exploited, while Israel and Iran engage in a cyber conflict. Learn about the threats and how to protect yourself.

Critical Threats: AWS Drone Strikes, Ransomware, and Zero-Days
AWS data centers face drone strikes, major ransomware attacks hit healthcare and gaming, and zero-day vulnerabilities are exploited in the wild. Stay ahead of these critical threats with our latest analysis.

New Surveillance Threats Emerge
Researchers uncover methods to track cars via tire sensors, while Microsoft warns of OAuth redirect abuse and a new attack hijacks OpenClaw instances. These emerging threats highlight the need for increased security measures.

GitHub Copilot and OpenClaw Under Attack
High-severity vulnerabilities in GitHub Copilot and OpenClaw pose significant risks to users. Learn about the threats and how to protect yourself.

Iranian Cyberattacks & Chrome Zero-Days
The UK warns of heightened Iranian cyberattack risks, while Chrome vulnerabilities put thousands at risk. Data breaches and cybercrime continue to threaten global security.
Zero-Day AI Threats and Cloud Security Updates
Critical zero-day vulnerabilities in AI systems pose significant threats, while cloud security enhancements offer new protections. Learn about the latest developments and how to stay secure.

Chrome Zero-Day & Azure Ransomware Attacks
A critical Google Chrome zero-day vulnerability is being exploited, while a Microsoft Azure vulnerability is being used by ransomware attackers. Learn about these threats and how to protect yourself.

Cisco SD-WAN Zero-Day Exploited, Devs Targeted, ICS Vulnerabilities Found
A critical Cisco SD-WAN zero-day is being exploited, while developers are being targeted by malicious campaigns and industrial control systems are vulnerable to new threats. Learn how to protect yourself and your organization from these emerging threats.

Cisco SD-WAN Zero-Day Under Active Exploitation
A critical zero-day vulnerability in Cisco SD-WAN has been exploited since 2023, allowing attackers to bypass authentication and gain administrative access. Meanwhile, a data breach at European DIY chain ManoMano has affected 38 million customers, highlighting the importance of securing third-party services and patching vulnerabilities.

Cisco SD-WAN Zero-Day Exploited, UAT-10027 Hits US Education
A critical Cisco SD-WAN zero-day is being exploited, while UAT-10027 targets US education and healthcare. EV2GO and SWITCH EV charging systems also have severe vulnerabilities.

Critical Charging Infrastructure Vulnerabilities and Cisco SD-WAN Zero-Day Exploit
Multiple critical vulnerabilities have been discovered in charging infrastructure systems, while a zero-day exploit has been found in Cisco SD-WAN. These threats highlight the importance of patching and keeping software up to date to prevent large-scale denial of service, privilege escalation, and corruption of data.

Critical Industrial Control System Vulnerabilities Under Active Exploitation
Multiple vulnerabilities in Yokogawa Centum and Exaopc products are under active exploitation, allowing attackers to gain control of industrial control systems. Cisco IOS and IOS XE software patches are also available to prevent further exploitation. Immediate action is required to patch these vulnerabilities.

Critical Router Flaws and State-Sponsored Hacks Expose Networks
Zero-day vulnerabilities in Juniper Networks PTX and Zyxel routers allow for full router takeover, while Chinese cyberspies breach telecom firms and government agencies. Ransomware and cybercrime threats also persist.

Critical Vulnerabilities and Malicious Campaigns Targeting Multiple Sectors
Newly disclosed vulnerabilities in software and hardware, along with malicious campaigns targeting specific sectors, pose significant threats to cybersecurity. Readers should be aware of these risks and take necessary precautions to protect themselves.

Industrial Control System Vulnerabilities Pose Critical Threats
Recent vulnerabilities in industrial control systems highlight the need for ongoing security maintenance and updates. Cybersecurity research emphasizes the importance of awareness and best practices to ensure business continuity.

Critical Infrastructure Under Fire
Johnson Controls Frick Controls Quantum HD vulnerabilities pose a high risk to critical infrastructure, while the Aeternum botnet loader emerges as a new threat. Learn about these emerging threats and how to protect against them.

Other Notable Threats Emerge as Ransomware and Zero-Days Persist
A previously undocumented threat activity cluster targets US education and healthcare, while Zyxel patches a critical vulnerability in its routers. Meanwhile, ransomware attacks and zero-day exploits continue to pose significant threats.

Zero-Day Attacks Surge: Aeternum Botnet, Critical Infrastructure Vulnerabilities, and Malicious Developer Campaigns
A surge in zero-day attacks, including the Aeternum botnet and critical infrastructure vulnerabilities, poses significant threats to global security. Meanwhile, malicious campaigns target developers and financial sectors, highlighting the need for enhanced cybersecurity measures.
Critical Cisco SD-WAN Flaw Exploited, China-Linked Espionage Uncovered, and EV Charging Hacks
A critical vulnerability in Cisco SD-WAN is being exploited, a Chinese cyber espionage campaign has been disrupted by Google, and vulnerabilities have been found in electric vehicle charging infrastructure. These threats pose significant risks to network security, intellectual property, and critical infrastructure.

Cisco SD-WAN Under Attack
Multiple Cisco SD-WAN vulnerabilities are being actively exploited, while developers and IT systems face targeted attacks. Learn about the key threats and how to protect yourself.

Critical Cisco SD-WAN Vulnerabilities Exploited
Multiple critical vulnerabilities in Cisco SD-WAN products are being exploited, allowing attackers to gain admin access and potentially disrupt critical infrastructure. Ransomware attacks are also on the rise, with a recent surge in attack numbers despite decreased payments.

Cisco SD-WAN Zero-Day Exploited, Chinese Cyber Espionage Disrupted
A critical zero-day vulnerability in Cisco SD-WAN is being actively exploited by attackers, while Google disrupts a Chinese cyber espionage campaign targeting telecoms and governments worldwide. Learn about the key threats and how to protect your organization.

Cisco SD-WAN Zero-Day Exploited, Devs Targeted, and Major Breaches
A critical Cisco SD-WAN zero-day is under active exploitation, while developers face targeted attacks, and major data breaches hit millions of users. Learn about the threats and how to protect yourself.

Cisco SD-WAN Zero-Day Under Active Exploitation
A critical zero-day vulnerability in Cisco SD-WAN is being actively exploited, allowing attackers to bypass authentication and gain administrative access. This vulnerability affects Cisco Catalyst SD-WAN Controller and Manager, with a patch available. Readers should prioritize updating their systems to prevent exploitation.

Cisco SD-WAN Zero-Day Exploited, AI Threats Rise
Critical Cisco SD-WAN vulnerabilities are under active exploitation, while malicious AI-related activities and targeted attacks on critical infrastructure pose significant threats to global security. Learn about the key risks and how to protect your organization.

Critical Cisco SD-WAN Bugs Exploited Amidst Zero-Days and AI Threats
Active exploitation of critical Cisco SD-WAN vulnerabilities, alongside zero-day exploits in cyber espionage campaigns and malicious AI-generated code attacks, pose significant threats to global cybersecurity. Learn about the key risks and necessary mitigation strategies.

Critical Vulnerabilities Exposed in Trend Micro, Juniper, and Zyxel Products
Newly disclosed vulnerabilities in Trend Micro, Juniper Networks, and Zyxel products pose significant risks to users. ICS and energy sector vulnerabilities are also highlighted, emphasizing the need for urgent patches and security measures.

CarGurus Breach & Zero-Day Sales Rock Cybersecurity
A massive data breach at CarGurus exposed 12.4 million accounts, while a former defense contractor employee was jailed for selling zero-days to a Russian broker. Learn about these critical threats and how to protect yourself.

Cisco SD-WAN Zero-Day Exploited, Plus Ransomware and SolarWinds Patches
A critical zero-day vulnerability in Cisco SD-WAN is being actively exploited, while the Lazarus Group launches a Medusa ransomware campaign and SolarWinds patches critical Serv-U flaws. Learn about these threats and how to protect your organization.

Critical Cisco and Zyxel Vulnerabilities Under Attack
Multiple critical vulnerabilities in Cisco SD-WAN and Zyxel routers are being actively exploited, posing significant risks to organizations. Learn about the threats and how to protect your networks.

Nation-State Cyberattacks Surge
MuddyWater, APT28, and Lazarus Group launch targeted attacks on organizations worldwide. Learn about the latest nation-state sponsored cyber threats and how to protect your organization.

RoguePilot & SANDWORM_MODE Threats Uncovered
High-severity vulnerabilities in GitHub Codespaces and npm packages have been discovered, posing significant risks to developers and the software supply chain. The RoguePilot flaw and SANDWORM_MODE campaign highlight the need for vigilance in AI-driven development tools and open-source dependencies.

Zero-Day Vulnerability Under Active Exploitation
A critical zero-day vulnerability is being actively exploited, while significant data breaches and new malware campaigns pose high risks to users. Immediate action is necessary to prevent further exploitation.

Zero-Days & Ransomware: Twin Threats to US Security
The Lazarus Group's Medusa ransomware attacks and active exploitation of zero-day vulnerabilities pose significant threats to national security. Recent incidents involve a former US defense contractor employee selling zero-day exploits to a Russian broker and the targeting of US healthcare organizations with Medusa ransomware.

Critical Vulnerabilities Under Attack
Multiple critical vulnerabilities are being actively exploited by threat actors, including the ShinyHunters extortion gang and North Korean state-backed hackers. New malware families and supply chain attacks are also on the rise, targeting healthcare organizations and financial institutions.

SolarWinds & FortiGate Under Attack
Critical vulnerabilities in SolarWinds and FortiGate pose significant risks, while recent ransomware attacks and newly disclosed threats demand immediate attention from security teams. Learn about the key threats and how to protect your organization.