Security

Palo Alto zero-day exploit: more dangerous than thought
A critical zero-day in Palo Alto Networks PAN-OS is being actively exploited to breach enterprise firewalls—and the full scale of the attack remains unknown.

Ivanti zero-day exploits hit critical infra
Active exploitation of two new Ivanti zero-days threatens government and enterprise networks worldwide. Patch urgently.

OpenSSH remote code execution vulnerability: fix
OpenSSH remote code execution vulnerability allows unauthenticated attackers to gain root access on Unix servers. Patch now.

Chrome zero-day exploit: Google warns of attacks
Chrome zero-day exploit used in targeted attacks. Google issues emergency patch. Update now to prevent theft.

Cisco zero-day exploited in wild
Cisco warns of active exploitation of a critical zero-day vulnerability in its IOS XE software, allowing remote attackers to gain root access and deploy implants.

Cisco zero-day exploited in wild
A critical Cisco IOS XE zero-day is under active exploitation, giving attackers full control of vulnerable devices.

GootBot malware goes fileless to blindside enterprise security
The GootBot malware module enables sophisticated fileless persistence, establishing backdoors in corporate networks through memory-based techniques that evade traditional detection.

APT29 Linux backdoor targets data centers in stealth campaign
A new, stealthy Linux backdoor dubbed 'SparrowDoor' has been linked to APT29, posing a critical threat to data center and cloud security. The kernel rootkit evades detection and targets containerized environments.

BazaCall Live Phish Attack Redefines the Phishing Nightmare
The BazaCall 'Live Phish' attack bypasses traditional email filters using voice calls to initiate sophisticated social engineering schemes in 2024. This hybrid vishing and malware campaign targets the human layer.

Zscaler zero-day exploit shatters zero-trust security model
A massive cyberattack on security giant Zscaler, using a new zero-day exploit, exposes the fragility of the 'never trust, always verify' model under siege.
