Critical Vulnerabilities in DrayTek Routers Exposes Devices to RCE Attack A series of critical vulnerabilities in DrayTek Vigor routers widely deployed in small office/home office [...]
15 Best Patch Management Tools In 2025 Patch management tools are essential for maintaining the security and efficiency of IT systems in 2025. These tools [...]
Cisco Nexus Vulnerability Let Attackers Inject Malicious Commands Cisco Systems has issued a critical security advisory addressing a command injection vulnerability in its Nexus 3000 and 9000 [...]
Threat Actor Allegedly Selling VMware ESXi 0-Day Exploit on Hacker Forum A cybercriminal operating under the alias “Vanger” has surfaced on underground forums, offering a [...]
New Active Directory Pentesting Tool to Validate KeyCredentialLink Management RedTeamPentesting has unveiled a new tool, keycred, which offers a robust solution for managing KeyCredentialLinks in [...]
Google Released PoC Exploit For Palo Alto Firewall Command Injection Vulnerability Google’s Project Zero and Mandiant cybersecurity teams have jointly published a proof-of-concept (PoC) exploit [...]
Researcher Details Fortinet FortiOS Vulnerabilities Allowing DoS & RCE Attacks A security audit of Fortinet’s FortiOS VPN conducted by Akamai researcher Ben Barnea has uncovered [...]
RedMike Hackers Exploited 1000+ Cisco Devices to Gain Admin Access Researchers observed a sophisticated cyber-espionage campaign led by the Chinese state-sponsored group known as “Salt [...]
Critical Cisco ISE Vulnerabilities Allow Arbitrary Command Execution Remotely Cisco has disclosed two critical vulnerabilities in its Identity Services Engine (ISE) software that could allow [...]
VMware Avi Load Balancer Vulnerability Let Attackers Gain Database Access Broadcom disclosed a critical vulnerability affecting its Avi Load Balancer product. The vulnerability, identified as [...]
