In the race against cyber threats, finding vulnerabilities is no longer enough. True security comes from understanding them—where they exist, how they were discovered, and what risks they pose. One ...
Continue ReadingMay 27, 2025
Missing Authentication & Authorization in Web-API in Mobatime AMX MTAPI v6 on IIS allows adversaries to unrestricted access via the network. The vulnerability is fixed in Version...Read More ...
Continue ReadingMay 27, 2025
CVE-2025-3248 Remote Code Execution using vulnerable API endpoint Proof of Concept. Info: - ⚠️ Use this at your own risk! - ❓ Added option to reverse shell. - ✅ Auto retry if validate_code is ...
Continue ReadingMay 27, 2025
Executive summary: Void Blizzard is a new threat actor Microsoft Threat Intelligence has observed conducting espionage operations primarily targeting organizations that are important to Russian govern ...
Continue ReadingMay 27, 2025
Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices and facilitate payroll fraud. The activity, first ...
Continue ReadingMay 27, 2025
CVE-2025-3248 Remote Code Execution using vulnerable API endpoint Proof of Concept. Info: - ⚠️ Use this at your own risk! - ❓ Added option to reverse shell. - ✅ Auto retry if validate_code is ...
Continue ReadingMay 27, 2025
creation_timestamp| type| source ---|---|--- 2025-05-27 10:50:59+00:00| seen|...Read More ...
Continue ReadingMay 27, 2025
Executive summary: Void Blizzard is a new threat actor Microsoft Threat Intelligence has observed conducting espionage operations primarily targeting organizations that are important to Russian govern ...
Continue ReadingMay 27, 2025
Back to Main