| 30 Apr 2026 |
cPanel 0-Day Authentication Bypass Vulnerability Explained |
Vulnerabilities
|
Critical
|
Dan Proctor
|
| 24 Apr 2026 |
Cisco firewall vulnerabilities: persistent malware threat |
Vulnerabilities
|
Critical
|
Dan Proctor
|
| 22 Apr 2026 |
AI-Assisted Credential Harvesting: React2Shell Server Exposed |
Vulnerabilities
|
Critical
|
Ben Warne
|
| 16 Apr 2026 |
APT28 DNS Hijacking: How Exploited Routers Enable Credential Theft |
Cyber Attacks
|
High
|
Leonie Witte
|
| 15 Apr 2026 |
Microsoft Defender 0-Day Vulnerability: Privilege Escalation Risk |
Vulnerabilities
|
High
|
Dan Proctor
|
| 14 Apr 2026 |
Fortinet SQL Injection Vulnerability: CISA Warning |
Vulnerabilities
|
Critical
|
Elsie Day
|
| 10 Apr 2026 |
New Research Shows the Vulnerability Exploitation Window is Shrinking Fast |
Vulnerabilities
|
Critical
|
Dan Proctor
|
| 08 Apr 2026 |
BlueHammer Windows Defender Exploit: Understanding the Threat |
Vulnerabilities
|
Critical
|
Jonny Pelter
|
| 02 Apr 2026 |
AI Phishing Attacks: Unravelling the New Age of Deceit |
Phishing & Social Engineering
|
High
|
Katya Watkins
|
| 01 Apr 2026 |
Axios NPM Supply Chain Attack: What Happened and How to Respond |
Vulnerabilities
|
Critical
|
Elsie Day
|
| 31 Mar 2026 |
Cisco Firewall 0-Day: What You Need to Know About This Ransomware Threat |
Vulnerabilities
|
High
|
Dan Proctor
|
| 31 Mar 2026 |
Citrix NetScaler Vulnerability: What You Need to Know |
Vulnerabilities
|
Critical
|
Dan Proctor
|
| 31 Mar 2026 |
Chrome Remote Code Execution: What the Latest Security Update Fixes |
Vulnerabilities
|
Critical
|
Ben Warne
|
| 31 Mar 2026 |
Cisco SD-WAN Vulnerabilities: What Professionals Need to Know |
Vulnerabilities
|
Critical
|
Elsie Day
|
| 31 Mar 2026 |
Understanding the Microsoft SharePoint Vulnerability and Its Risks |
Vulnerabilities
|
Critical
|
Elsie Day
|
| 30 Mar 2026 |
Chrome Remote Code Execution: 8 Vulnerabilities Fixed in Urgent Update |
Vulnerabilities
|
Critical
|
Ben Warne
|