CYBER Threat Intelligence Reports
LATEST CTIs
Sophisticated ‘Operation Triangulation’ Exploits Undocumented iPhone Hardware Features
A highly sophisticated cyber-espionage campaign, dubbed ‘Operation Triangulation’, has been leveraging undocumented hardware features in Apple's iPhone chips to bypass stringent security measures. Kaspersky's Global…
Read more >

Privilege Escalation Flaw in Google Cloud’s Kubernetes Service Resolved
Google Cloud recently patched a medium-severity security vulnerability in its Kubernetes Service, which could allow attackers with existing access to a Kubernetes cluster to escalate…
Read more >

New Chrome Zero-Day Vulnerability (CVE-2023-7024)
A newly identified vulnerability in the Google Chrome browser has been discovered, referenced as CVE-2023-7024. This vulnerability has been actively exploited in the wild and…
Read more >

Multiple Vulnerabilities in Perforce Server
Microsoft has identified four critical flaws in Perforce Helix Core Server, with the most severe allowing for remote code execution (RCE) and network takeover.
Read more >

GitHub Misuse by Hackers
Recent reports indicate that malicious actors are increasingly exploiting GitHub to conduct their operations. This alert is intended to inform you of the nature of…
Read more >

Critical RCE Vulnerability CVE-2023-50164 in Apache Struts 2
A new critical remote code execution (RCE) vulnerability, CVE-2023-50164, has been identified in Apache Struts 2, a popular open source web application framework.
Read more >

