Open Nav
Sign Up

CYBER Threat Intelligence Reports

LATEST CTIs

CISA Adds Jenkins CLI Path Traversal Vulnerability to Known Exploited Vulnerabilities Catalog (CVE-2024-23897)

The Cybersecurity and Infrastructure Security Agency (CISA) has added the Jenkins CLI Path Traversal Vulnerability (CVE-2024-23897) to its Known Exploited Vulnerabilities Catalog, urging immediate remediation…

Read more >

Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers

Researchers have uncovered multiple critical vulnerabilities in AWS, including a severe flaw dubbed Bucket Monopoly, which could lead to remote code execution (RCE), full-service takeovers,…

Read more >

MongoDB Addresses Windows Vulnerability (CVE-2024-7553) Across Multiple Products

MongoDB has patched a high-severity vulnerability, CVE-2024-7553, that affects multiple versions of its server and driver products on Windows systems. The flaw, which could allow…

Read more >

Jenkins Vulnerabilities Expose Servers to RCE Attack (CVE-2024-43044, CVE-2024-43045)

Two critical vulnerabilities have been identified in Jenkins, a widely-used open-source automation server, which expose servers to significant risks, including Remote Code Execution (RCE). The…

Read more >

Surge in Medusa Ransomware Attacks: In-Depth Analysis

Medusa is a sophisticated ransomware-as-a-service (RaaS) platform that emerged in late 2022, targeting sectors like finance, healthcare, and government through phishing emails and exploit kits.…

Read more >

Docker Vulnerability CVE-2024-41110 (CVSS 10) Allows System Takeover

Docker has issued an advisory for CVE-2024-41110, a critical vulnerability with a CVSS score of 10. This flaw allows attackers to bypass authorization plugins (AuthZ)…

Read more >

Cybersecurity Best Practice

Under Cyber Attack?

Fill out the form and we will contact you immediately.