CYBER Threat Intelligence Reports
LATEST CTIs
Google Chrome Zero-Day Actively Exploited: CVE-2025-13223
A new high-severity zero-day in Google Chrome is being actively exploited to compromise users through malicious websites. The vulnerability, tracked as CVE-2025-13223, is a type…
Read more >

Critical Remote Code Execution in WatchGuard Firebox VPN Appliances: CVE-2025-9242
A critical vulnerability in WatchGuard Firebox firewalls is being actively exploited to gain remote, unauthenticated code execution on perimeter devices. The flaw, tracked as CVE-2025-9242,…
Read more >

Critical Zero-Day in Samsung Galaxy Devices: CVE-2025-21042
A newly disclosed zero-day vulnerability in Samsung Galaxy smartphones has been actively exploited in the wild to deploy a sophisticated Android spyware framework known as…
Read more >

Critical RCE in CentOS Web Panel (CVE-2025-48703)
CVE-2025-48703 is a critical unauthenticated remote-code-execution (OS command injection) vulnerability in Control Web Panel (CWP / CentOS Web Panel) that allows attackers to inject shell…
Read more >

Actively Exploited Critical Vulnerability in Post SMTP Plugin for WordPress: CVE-2025-11833
A critical vulnerability (CVE-2025-11833) in the widely used Post SMTP WordPress plugin is being actively exploited to hijack administrator accounts and gain full control of…
Read more >

Malicious npm Packages Target Developers with Multi-OS Info-Stealer Payloads
A new software supply-chain attack has been uncovered involving ten malicious npm packages designed to steal developer credentials across Windows, macOS, and Linux systems. These…
Read more >

