Researcher Details Fortinet FortiOS Vulnerabilities Allowing DoS & RCE Attacks A security audit of Fortinet’s FortiOS VPN conducted by Akamai researcher Ben Barnea has uncovered [...]
SonicWall Firewall Authentication Bypass Vulnerability Exploited in Wild Following PoC Release A critical authentication bypass vulnerability in SonicWall firewalls, tracked as CVE-2024-53704, is now being [...]
Hackers Actively Exploiting New PAN-OS Authentication Bypass Vulnerability Palo Alto Networks has released a patch for a high-severity authentication bypass vulnerability, identified as CVE-2025-0108, affecting their [...]
RedMike Hackers Exploited 1000+ Cisco Devices to Gain Admin Access Researchers observed a sophisticated cyber-espionage campaign led by the Chinese state-sponsored group known as “Salt [...]
Critical Cisco ISE Vulnerabilities Allow Arbitrary Command Execution Remotely Cisco has disclosed two critical vulnerabilities in its Identity Services Engine (ISE) software that could allow [...]
10 Best UTM (Unified Threat Management) Firewalls – 2025 Unified Threat Management (UTM) firewall is a comprehensive cybersecurity solution that integrates multiple security functions into a [...]
New Threat Hunting Technique to Uncover Malicious Infrastructure Using SSL History As internet security evolves, SSL (Secure Sockets Layer) certificates, cornerstones of encrypted communication, are [...]
VMware Avi Load Balancer Vulnerability Let Attackers Gain Database Access Broadcom disclosed a critical vulnerability affecting its Avi Load Balancer product. The vulnerability, identified as [...]
Hackers Allegedly Selling Fortinet Vulnerability Exploit on Dark Web Forums A significant cybersecurity threat has emerged as hackers on a prominent Russian dark web forum claim to [...]
Hackers Actively Exploiting Zyxel 0-day Vulnerability to Execute Arbitrary Commands A significant zero-day vulnerability in Zyxel CPE series devices, identified as CVE-2024-40891, is being actively exploited by [...]
