CYBER Threat Intelligence Reports
LATEST CTIs
React2Shell (CVE-2025-55182): Critical React RCE With Active China-Linked Exploitation
CVE-2025-55182, also known as React2Shell, is a critical unauthenticated remote-code-execution vulnerability in React Server Components (RSC) that allows attackers to execute arbitrary code on the…
Read more >

Google Chrome Zero-Day Actively Exploited: CVE-2025-13223
A new high-severity zero-day in Google Chrome is being actively exploited to compromise users through malicious websites. The vulnerability, tracked as CVE-2025-13223, is a type…
Read more >

Critical Remote Code Execution in WatchGuard Firebox VPN Appliances: CVE-2025-9242
A critical vulnerability in WatchGuard Firebox firewalls is being actively exploited to gain remote, unauthenticated code execution on perimeter devices. The flaw, tracked as CVE-2025-9242,…
Read more >

Critical Zero-Day in Samsung Galaxy Devices: CVE-2025-21042
A newly disclosed zero-day vulnerability in Samsung Galaxy smartphones has been actively exploited in the wild to deploy a sophisticated Android spyware framework known as…
Read more >

Critical RCE in CentOS Web Panel (CVE-2025-48703)
CVE-2025-48703 is a critical unauthenticated remote-code-execution (OS command injection) vulnerability in Control Web Panel (CWP / CentOS Web Panel) that allows attackers to inject shell…
Read more >

Actively Exploited Critical Vulnerability in Post SMTP Plugin for WordPress: CVE-2025-11833
A critical vulnerability (CVE-2025-11833) in the widely used Post SMTP WordPress plugin is being actively exploited to hijack administrator accounts and gain full control of…
Read more >

