CYBER Threat Intelligence Reports

LATEST CTIs

Urge in Banking Malware Campaign Abusing Google Cloud Run

A rise in banking malware campaigns exploiting Google Cloud Run has been detected, spreading Trojans like Astaroth, Mekiotio, and Ousaban across Latin America, Europe, and…

Read more >

“Helpdesk Support” Phishing Campaign Compromising Outlook Credentials

The "Helpdesk Support" phishing campaign targets Outlook users with deceptive emails, leading to fake login pages that steal credentials. To combat this threat, the Italian…

Read more >

Linux Kernel Flaw (CVE-2024-0646) Exposes Systems to Privilege Escalation

The CVE-2024-0646 vulnerability in the Linux Kernel's kTLS subsystem (CVSS 7.8) allows local users to escalate privileges or disrupt system operations. It arises from improper…

Read more >

CVE-2024-25600: WordPress’s Bricks Builder RCE Flaw Under Active Exploitation

The critical vulnerability CVE-2024-25600 in WordPress's Bricks Builder (CVSS score: 9.8) allows unauthenticated attackers to execute code on the server. This flaw is actively exploited,…

Read more >

Critical Privilege Elevation Flaw Patched in Zoom Windows Applications (CVE-2024-24691)

Zoom has fixed a critical vulnerability (CVE-2024-24691) in its Windows applications, allowing unauthenticated attackers to escalate privileges. Users are urged to update their Zoom software…

Read more >

Critical Zero-Day Vulnerability in Microsoft Exchange Server Exploited Prior to Patch (CVE-2024-21410)

Microsoft has issued an urgent advisory for a critical Exchange Server vulnerability (CVE-2024-21410) that was exploited as a zero-day. Customers should immediately update to Exchange…

Read more >

Microsoft Patches Critical Windows and Office Vulnerabilities Exploited in Attacks (CVE-2024-21413, CVE-2024-21412 and CVE-2024-21351)

Microsoft has released updates to address 72 vulnerabilities in the Windows ecosystem, including three that have been exploited in live malware attacks. The critical vulnerabilities…

Read more >

Azure Cloud and Microsoft 365 Targeted Attacks

A cyber campaign is targeting Microsoft Azure and 365, aiming at senior executives to steal credentials and data. Attack strategies include tailored phishing and MFA…

Read more >

CISA: OpenSSL Vulnerabilities and Security Framework Initiative (CVE-2023-0286, CVE-2022-4304)

OpenSSL has announced vulnerabilities in versions 3.0.0, 2.2.2, and 1.0.2; users are urged to update to 3.0.8, 1.1.1t, or 1.0.2zg promptly. Concurrently, CISA and OpenSSF…

Read more >

Cybersecurity Best Practice

Website Vulnerabilities and How Penetration Testing Can Safeguard Them

Learn about today's most prevalent website vulnerabilities, the consequences if exploited, and how comprehensive penetration testing helps identify weaknesses before attackers do.

Read more >

Website Vulnerabilities and How Penetration Testing Can Safeguard Them

How Much Does Penetration Testing Cost On Average In 2023?

Discover the price of protecting your business in 2023! Uncover the average penetration testing cost and safeguard your company from cyber threats.

Read more >

how much does a pentest cost

Lessons Learned: The Critical Role of External Penetration Testing

This article explores real-world examples that demonstrate the critical importance of external penetration testing for proactively identifying vulnerabilities before attackers can exploit them.

Read more >

Lessons Learned: The Critical Role of External Penetration Testing

How To Use Both Vulnerability Scanning And Penetration Testing In Your Security Strategy

Boost your security strategy with the ultimate duo: vulnerability scanning and penetration testing. Discover how to master both for unstoppable protection.

Read more >

How To Use Both Vulnerability Scanning And Penetration Testing In Your Security Strategy

Internal vs. External Penetration Testing: What’s The Difference?

Uncover the key differences between External and Internal Penetration Testing. Dive into the world of cybersecurity and level up your protection strategy now!

Read more >

internal vs externam pen testing

Web Application Penetration Testing Services

Unlock the secrets of your web app's vulnerabilities with our expert web application penetration testing services. Safeguard your online presence today!

Read more >

Web Application Penetration Testing Services
Under Cyber Attack?

Fill out the form and we will contact you immediately.