In an alarming development that underscores the persistent threat of supply chain attacks, cybersecurity researchers have uncovered a widespread campaign involving 131 malicious Chrome extensions [...]
Critical ASP.NET Vulnerability Bypasses Security Remotely: What You Need to Know A significant security flaw in ASP.NET Core has come to light, enabling authenticated attackers [...]
A significant security flaw has been identified in Zyxel’s ATP and USG series firewalls, posing a critical risk to network security. This vulnerability, tracked as [...]
The Undeniable ROI of Threat Intelligence: Protecting Profits, Not Just Perimeters In the current threat landscape, cybersecurity is less about abstract defense and more about [...]
The open-source supply chain, a cornerstone of modern software development, has become a fertile ground for sophisticated cyberattacks. From malicious package injections to compromised dependencies, [...]
A new, highly sophisticated threat campaign has set its sights on critical sectors. Between May and August 2025, a group identified as Cavalry Werewolf APT [...]
In the relentless cat-and-mouse game of cybersecurity, few threats are as insidious as remote code execution (RCE) vulnerabilities. When such a flaw surfaces within a [...]
—–BEGIN PGP SIGNED MESSAGE—– Hash: SHA256 Multiple Vulnerabilities in Juniper Networks Indian – Computer Emergency Response Team (https://www.cert-in.org.in) Severity Rating: High Software Affected Juniper Networks [...]
—–BEGIN PGP SIGNED MESSAGE—– Hash: SHA256 Multiple Vulnerabilities in Mozilla Products Indian – Computer Emergency Response Team (https://www.cert-in.org.in) Severity Rating: HIGH Software Affected Mozilla Firefox [...]
—–BEGIN PGP SIGNED MESSAGE—– Hash: SHA256 Multiple Vulnerabilities in Google ChromeOS / ChromeOS Flex Indian – Computer Emergency Response Team (https://www.cert-in.org.in) Severity Rating: HIGH Software [...]
