Open Nav
Sign Up

CYBER Threat Intelligence Reports

LATEST CTIs

Critical PHP RCE Vulnerability Exploited in the Wild (CVE-2024-4577)

A critical remote code execution (RCE) vulnerability, CVE-2024-4577, impacting Windows-based PHP installations configured to use PHP-CGI, is actively being exploited.  This PHP-CGI argument injection flaw…

Read more >

CVE-2024-4577

Facebook FreeType Flaw Exploited in Attacks (CVE-2025-27363)

Security researchers and Meta have reported active exploitation of a high-severity vulnerability (CVE-2025-27363) affecting the FreeType font rendering library, commonly used across numerous applications, including…

Read more >

CVE-2025-27363

Android Zero-Days Used by Authorities to Unlock Confiscated Devices (CVE-2024-50302)

A newly disclosed high-severity Android vulnerability (CVE-2024-50302) has been actively used by Serbian authorities to unlock confiscated devices. The flaw, found in the Linux kernel’s…

Read more >

CVE-2024-50302

Microsoft Partner Center Improper Access Control Vulnerability (CVE-2024-49035)

A critical access control flaw (CVE-2024-49035) in Microsoft Partner Center allows attackers to gain unauthorized privileges, posing a major security risk. Overview Microsoft disclosed this…

Read more >

CVE-2024-49035

Critical Vulnerabilities in Citrix Secure Access Client for Mac (CVE-2025-1222, CVE-2025-1223)

Citrix has released a security advisory addressing two critical vulnerabilities affecting Citrix Secure Access Client for Mac.  These vulnerabilities, identified as CVE-2025-1222 and CVE-2025-1223, could…

Read more >

citrix secure access

Beware: North Korean Tech Workers Infiltrating Western Companies

A growing number of North Korean IT professionals are securing jobs in Western companies under false identities, posing serious cybersecurity and compliance risks.  These workers,…

Read more >

north korean tech workers

Cybersecurity Best Practice

Under Cyber Attack?

Fill out the form and we will contact you immediately.