Open Nav
Sign Up

CYBER Threat Intelligence Reports

LATEST CTIs

CISA: Active Exploitation of SolarWinds HelpDesk Software Vulnerability (CVE-2024-28987)

A critical vulnerability in SolarWinds Web Help Desk (WHD) software, originally discovered in August, is confirmed to being under active exploitation. Tracked as CVE-2024-28987, this…

Read more >

Supply Chain Attacks Exploit Entry Points in Python, npm, and Other Open-Source Ecosystems

Supply chain attacks are exploiting entry points in open-source ecosystems like Python and npm to inject malicious code and compromise developer environments.

Read more >

Vulnerability in Jetpack WordPress Plugin (Jetpack Versions 3.9.9 (2016) to 13.9.0)

A critical vulnerability in the Jetpack WordPress plugin, affecting over 27 million sites, has been patched, preventing logged-in users from accessing others' contact form submissions.

Read more >

Privilege Escalation Vulnerability in Fortinet FortiAnalyzer (CVE-2024-45330)

Summary:A new vulnerability, CVE-2024-45330, has been found in Fortinet FortiAnalyzer and FortiAnalyzer Cloud (versions 7.4.0 - 7.4.3 and 7.2.2 - 7.2.5). This bug could let…

Read more >

XSS Vulnerability Discovered in WordPress LiteSpeed Cache Plugin (CVE-2024-47374)

A high-severity stored XSS vulnerability (CVE-2024-47374) in the WordPress LiteSpeed Cache plugin allows unauthenticated attackers to execute arbitrary JavaScript, potentially leading to site takeover, patched…

Read more >

Vulnerability in pgAdmin’s OAuth2 Authentication Mechanism (CVE-2024-9014)

A critical vulnerability in pgAdmin’s OAuth2 authentication (CVE-2024-9014, CVSS 9.9) allows attackers to compromise user data, urging immediate upgrade to version 8.12.

Read more >

Cybersecurity Best Practice

Under Cyber Attack?

Fill out the form and we will contact you immediately.