Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution

11/12/2025 0 Comments 0 tags

Huntress is warning of a new actively exploited vulnerability in Gladinet’s CentreStack and Triofox products stemming from the use of hard-coded cryptographic keys that have affected nine organizations so far.

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors

10/12/2025 0 Comments 0 tags

React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to deliver cryptocurrency miners and an array of previously undocumented malware

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

10/12/2025 0 Comments 0 tags

New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to achieve remote code execution. WatchTowr Labs, which has codenamed the “invalid cast

Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling

10/12/2025 0 Comments 0 tags

Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption (IDE) protocol specification that could expose a local attacker to serious risks. The

Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups

10/12/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and compression utility to its Known Exploited Vulnerabilities (KEV) catalog, citing

Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes

10/12/2025 0 Comments 0 tags

Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations, your identities, and your code. Standard security tools often

Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days

10/12/2025 0 Comments 0 tags

Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that has been actively exploited in the wild. Of the

Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws

10/12/2025 0 Comments 0 tags

Fortinet, Ivanti, and SAP have moved to address critical security flaws in their products that, if successfully exploited, could result in an authentication bypass and code execution. The Fortinet vulnerabilities

North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware

09/12/2025 0 Comments 0 tags

Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical security React2Shell flaw in React Server Components (RSC) to deliver a previously

Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure

09/12/2025 0 Comments 0 tags

Four distinct threat activity clusters have been observed leveraging a malware loader known as CastleLoader, strengthening the previous assessment that the tool is offered to other threat actors under a