Open Nav
Sign Up

CYBER Threat Intelligence Reports

LATEST CTIs

Sophisticated ‘Operation Triangulation’ Exploits Undocumented iPhone Hardware Features

A highly sophisticated cyber-espionage campaign, dubbed ‘Operation Triangulation’, has been leveraging undocumented hardware features in Apple's iPhone chips to bypass stringent security measures. Kaspersky's Global…

Read more >

operation triangulation exploit

Privilege Escalation Flaw in Google Cloud’s Kubernetes Service Resolved

Google Cloud recently patched a medium-severity security vulnerability in its Kubernetes Service, which could allow attackers with existing access to a Kubernetes cluster to escalate…

Read more >

Google Cloud Kubernetes Patch Release

New Chrome Zero-Day Vulnerability (CVE-2023-7024)

A newly identified vulnerability in the Google Chrome browser has been discovered, referenced as CVE-2023-7024. This vulnerability has been actively exploited in the wild and…

Read more >

Chrome Zero-Day Vulnerability

Multiple Vulnerabilities in Perforce Server

Microsoft has identified four critical flaws in Perforce Helix Core Server, with the most severe allowing for remote code execution (RCE) and network takeover.

Read more >

Multiple Vulnerabilities in Perforce Server

GitHub Misuse by Hackers

Recent reports indicate that malicious actors are increasingly exploiting GitHub to conduct their operations. This alert is intended to inform you of the nature of…

Read more >

Urgent Alert - guthub misuse by hackers

Critical RCE Vulnerability CVE-2023-50164 in Apache Struts 2

A new critical remote code execution (RCE) vulnerability, CVE-2023-50164, has been identified in Apache Struts 2, a popular open source web application framework.

Read more >

CVE 2023-50164 critical vulnerability

Cybersecurity Best Practice

Under Cyber Attack?

Fill out the form and we will contact you immediately.