Open Nav
Sign Up

CYBER Threat Intelligence Reports

LATEST CTIs

Supply Chain Attacks Exploit Entry Points in Python, npm, and Other Open-Source Ecosystems

Supply chain attacks are exploiting entry points in open-source ecosystems like Python and npm to inject malicious code and compromise developer environments.

Read more >

Vulnerability in Jetpack WordPress Plugin (Jetpack Versions 3.9.9 (2016) to 13.9.0)

A critical vulnerability in the Jetpack WordPress plugin, affecting over 27 million sites, has been patched, preventing logged-in users from accessing others' contact form submissions.

Read more >

Privilege Escalation Vulnerability in Fortinet FortiAnalyzer (CVE-2024-45330)

Summary:A new vulnerability, CVE-2024-45330, has been found in Fortinet FortiAnalyzer and FortiAnalyzer Cloud (versions 7.4.0 - 7.4.3 and 7.2.2 - 7.2.5). This bug could let…

Read more >

XSS Vulnerability Discovered in WordPress LiteSpeed Cache Plugin (CVE-2024-47374)

A high-severity stored XSS vulnerability (CVE-2024-47374) in the WordPress LiteSpeed Cache plugin allows unauthenticated attackers to execute arbitrary JavaScript, potentially leading to site takeover, patched…

Read more >

Vulnerability in pgAdmin’s OAuth2 Authentication Mechanism (CVE-2024-9014)

A critical vulnerability in pgAdmin’s OAuth2 authentication (CVE-2024-9014, CVSS 9.9) allows attackers to compromise user data, urging immediate upgrade to version 8.12.

Read more >

CISA: Microsoft Windows Task Scheduler Privilege Escalation Vulnerability  (CVE-2019-1069 )

CVE-2019-1069 is a Privilege Escalation Vulnerability in Microsoft Windows Task Scheduler, allowing local attackers to escalate from standard user to administrator privileges. Actively exploited in…

Read more >

Cybersecurity Best Practice

Under Cyber Attack?

Fill out the form and we will contact you immediately.