Cyble Research & Intelligence Labs (CRIL) has uncovered a post-exploitation Linux framework called ShadowHS, designed for stealthy,…
Tag:
Exploitation
-
-
-
Vulnerability
Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088
by adminby adminRavie LakshmananJan 28, 2026Vulnerability / Threat Intelligence Google on Tuesday revealed that multiple threat…
-
Vulnerability
Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
by adminby adminRavie LakshmananJan 28, 2026Network Security / Zero-Day Fortinet has begun releasing security updates to…
-
Vulnerability
Microsoft Office Zero-Day (CVE-2026-21509) – Emergency Patch Issued for Active Exploitation
by adminby adminRavie LakshmananJan 27, 2026Zero-Day / Vulnerability Microsoft on Monday issued out-of-band security patches for…
-
-
-
Vulnerability
CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution
by adminby adminJan 13, 2026Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency…
-
OS SecuritySecurity
CISA flags max-severity bug in HPE OneView amid active exploitation
by adminby adminInfrastructure-wide consequences CVE-2025-37164 is caused by improper input handling in a publicly reachable REST…
-
Vulnerability
Active Exploitation Hits Legacy D-Link DSL Routers via Critical Remote Code Execution Flaw
by adminby adminJan 07, 2026Ravie LakshmananNetwork Security / Vulnerability A newly discovered critical security flaw in…
Newer Posts
