Tag: Security Pro
-
Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass
Threat actors have begun to exploit two newly disclosed security flaws in Fortinet FortiGate devices, less than a week after public …
-
GitHub Scanner for React2Shell (CVE-2025-55182) Turns Out to Be Malware
A GitHub repository posing as a vulnerability scanner for CVE-2025-55182, also referred to as “React2Shell,” was exposed as malicious …
-
CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity flaw impacting Sierra Wireless AirLink …
-
Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks
A high-severity unpatched security vulnerability in Gogs has come under active exploitation, with more than 700 compromised instances …
-
How Cybercriminals Exploit Social Media for Hacking
Unmasking Cybercrime: How Hackers Exploit Social Media In today’s digital age, social media has become an integral part of our daily …
-
North Korean Hackers Deploy EtherRAT Malware in React2Shell Exploits
A team of cybersecurity researchers at Sysdig, a firm specialising in protecting cloud and container-based apps, has found a new malware …
-
Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and …
-
React2Shell Exploit Campaigns Tied to North Korean Cyber Intrusion Tactics
Security researchers at Sysdig have observed new campaigns exploiting React2Shell which appear to have the hallmarks of North Korean …
-
Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks
A critical security flaw in the Sneeit Framework plugin for WordPress is being actively exploited in the wild, per data from Wordfence. The …
-
Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach
Barts Health NHS Trust has confirmed that the Cl0p ransomware group stole files from one of its invoice databases after exploiting a …
-
Vulnerability Assessment vs Penetration Testing
Understanding Vulnerability Assessment and Penetration Testing In the modern-day digital landscape, securing information is paramount. Two …
-
React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability
A critical remote code execution vulnerability in React.js has been identified. React.js is a JavaScript library for building fast, …
●●●
