top of page
ALL POSTS
Aruba Patches Critical Vulnerabilities in Instant On and Networking Devices
Key Findings HPE Networking has released critical software patches for vulnerabilities in its Instant On series of access points and routers. The flaws include a high-severity Denial-of-Service (DoS) vulnerability (CVE-2025-37166) that can crash devices, and an information exposure issue (CVE-2025-37165) that could leak network configuration details. The update also addresses legacy kernel-level vulnerabilities (CVE-2023-52340, CVE-2022-48839) that could lead to DoS and memor
Jan 152 min read
Fortinet Fixes Critical FortiSIEM Vulnerabilities
Key Findings Fortinet has released updates to fix a critical security flaw impacting FortiSIEM that could allow an unauthenticated attacker to achieve code execution on susceptible instances. The vulnerability, tracked as CVE-2025-64155, is rated 9.4 out of 10.0 on the CVSS scoring system. The flaw allows for OS command injection via crafted TCP requests to the phMonitor service running on port 7900. Fortinet has also patched a critical vulnerability in FortiFone (CVE-2025-47
Jan 142 min read
GitGuardian Closes 2025 with Strong Enterprise Momentum, Safeguarding Millions of Developers Worldwide
Key Findings GitGuardian, the leading secrets and Non-Human Identity (NHI) security platform, experienced record growth in ARR and customer expansion throughout 2025. 60% of new enterprise customers signed multi-year agreements, demonstrating confidence in GitGuardian's long-term value. GitGuardian's platform now protects more than 115K developers across enterprise customers globally, with over 610K enterprise repositories continuously monitored for exposed secrets. The platf
Jan 142 min read
Title: Panorays 2026 Study: 85% of CISOs Unable to Detect Third-Party Threats Amid Rising Supply Chain Attacks
Key Findings and Insights Preparedness is dangerously low: While 77% of CISOs see third-party risk as a major threat, only 21% have tested crisis response plans in place. Most organizations are blind to vendors: Although 60% report rising third-party breaches, just 41% monitor risk beyond direct suppliers. Shadow AI is creating new attack paths: Despite rapid AI adoption, only 22% of CISOs have formal vetting processes, leaving unmanaged third-party AI tools embedded in core
Jan 142 min read
Microsoft Fixes 114 Windows Flaws in January 2026 Patch, Including One Actively Exploited
Key Findings Microsoft released its first security update for 2026, addressing 114 security flaws 8 vulnerabilities were rated Critical, and 106 were rated Important in severity The update includes 58 privilege escalation, 22 information disclosure, 21 remote code execution, and 5 spoofing flaws The update marks the third-largest January Patch Tuesday after January 2025 and January 2022 2 previously disclosed zero-day vulnerabilities were also addressed Background Microsoft r
Jan 142 min read
Microsoft Patch Tuesday for January 2026 — Snort rules and prominent vulnerabilities
Key Findings Microsoft released its January 2026 security update, addressing 112 vulnerabilities, including 8 critical flaws One of the "important" vulnerabilities, CVE-2026-20805, is being exploited in the wild 6 out of the 8 critical vulnerabilities are remote code execution (RCE) affecting Windows services and Microsoft Office The remaining 2 critical vulnerabilities are elevation of privilege (EoP) affecting Windows Graphic Component and Windows Virtualization-Based Secur
Jan 142 min read
Malicious Chrome Extension Steals Wallet Login Credentials
Key Findings Researchers have discovered a malicious Google Chrome extension named "MEXC API Automator" that steals API keys from MEXC cryptocurrency exchange users. The extension masquerades as a tool to simplify the management of MEXC API keys for automated trading. In reality, the extension programmatically creates new API keys, enables withdrawal permissions, hides the withdrawal permission in the UI, and exfiltrates the API keys to a Telegram bot controlled by the threat
Jan 132 min read
CISA Adds Gogs Flaw to Known Exploited Vulnerabilities Catalog
Key Findings: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a flaw impacting Gogs, a lightweight, open-source, self-hosted Git service, to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability, tracked as CVE-2025-8110, has a CVSS score of 8.7 and is a path traversal issue in the PutContents API that allows for local execution of code. The flaw is a bypass for a previously patched remote code execution (RCE) vulnerability, CVE-2024-
Jan 132 min read
CVE-2025-12420: Critical ServiceNow Flaw Enables Unauthenticated Impersonation
Key Findings A critical vulnerability (CVE-2025-12420) has been discovered in the ServiceNow AI Platform, allowing unauthenticated attackers to impersonate legitimate users. The vulnerability has a severity score of 9.3 out of 10 and poses a significant risk of privilege escalation. ServiceNow has released security updates to address the flaw, but self-hosted customers and partners need to take immediate action. Background The vulnerability, dubbed CVE-2025-12420, is a failur
Jan 132 min read
Spanish police disrupt global Black Axe network, arrest alleged leaders
Key Findings: Spanish National Police, in cooperation with Europol and Bavarian authorities, arrested 34 alleged members of the Black Axe criminal network, including 10 Nigerian nationals believed to be leaders. The coordinated law enforcement operation took place in Seville, Madrid, Malaga, and Barcelona, significantly disrupting the group's activities. Black Axe is a highly structured, hierarchical criminal organization with origins in Nigeria and a global presence in dozen
Jan 122 min read
n8n Supply Chain Attack Steals OAuth Tokens via Compromised Community Nodes
Here is the article with the key findings in bullet point format, the background as the first major point, and the headers formatted with ##: Key Findings Threat actors uploaded 8 malicious packages on the npm registry masquerading as n8n workflow automation integrations to steal OAuth credentials One such package, "n8n-nodes-hfgjf-irtuinvcm-lasdqewriit", mimicked a Google Ads integration and prompted users to link their advertising account to siphon the credentials This atta
Jan 122 min read
Researchers Uncover Service Providers Fueling Industrial-Scale Crypto Fraud
Here is an article in the requested format: Key Findings Cybersecurity researchers have uncovered two service providers that supply online criminal networks with tools and infrastructure to fuel the pig butchering-as-a-service (PBaaS) economy. Since 2016, Chinese-speaking criminal groups have established industrial-scale scam centers across Southeast Asia, creating special economic zones devoted to fraudulent investment and impersonation operations. These compounds host thous
Jan 122 min read
The ideals of Aaron Swartz in an age of control revisited
Key Findings: Aaron Swartz's life, work, and ideals continue to shape the internet, digital rights, and the concept of knowledge as a public good. Swartz believed that access to knowledge was a fundamental right and challenged the monopolization of information by academic publishers and institutions. His decision to download and share academic papers was an act of civil disobedience, which led to aggressive government prosecution and his tragic death at the age of 26. Swartz'
Jan 122 min read
The XML Trap: CVE-2025-68493, a Critical Struts 2 Flaw Exposing Data
Key Findings A new vulnerability, CVE-2025-68493, has been discovered in the Apache Struts 2 web application framework. The flaw, which affects multiple versions of Struts 2, allows for XML External Entity (XXE) injection attacks. The vulnerability can lead to data disclosure, denial of service, and server-side request forgery (SSRF). The issue stems from improper validation of XML configurations in the XWork component of Struts 2. Background Apache Struts 2 is a popular open
Jan 112 min read
Europol Disrupts Black Axe Cybercrime in Spain
Europol Raids Disrupt Black Axe Cybercrime Ring in Spain Key Findings: International law enforcement agencies have dealt a major blow to the criminal network known as Black Axe. 34 people were arrested across Spain, with the majority in Seville. Black Axe is a large, organized criminal group originating in West Africa, with an estimated 30,000 members worldwide. The group is known for online fraud schemes, including romance scams, phishing, and business email compromise (BEC)
Jan 112 min read
North Korea-Linked Kimsuky APT Group Responsible for Phishing Attacks, FBI Warns
Key Findings The FBI warns that the North Korea-linked advanced persistent threat (APT) group Kimsuky is targeting governments, think tanks, and academic institutions with "quishing" attacks. Quishing is a social engineering attack that uses malicious QR codes to trick victims into visiting fake websites or downloading malware. Kimsuky has conducted spear-phishing campaigns using QR codes that impersonate trusted figures like foreign advisors, embassy staff, and think tank em
Jan 112 min read
Instagram Data Breach Affects Millions of Users
Key Findings: A massive data breach has exposed the personal information of about 17.5 million Instagram users. The exposed data includes usernames, physical addresses, phone numbers, and email addresses. Cybercriminals have stolen this sensitive information and are selling it in batches on dark web forums. Affected users have reported receiving password reset emails, raising concerns about ongoing phishing attempts. Security experts warn this breach poses serious privacy and
Jan 112 min read
The Atomic Age: Meta Secures 6.6 GW of Nuclear Power to Fuel its AI Future
Key Findings Meta has secured up to 6.6 GW of nuclear power through landmark deals with Vistra, TerraPower, and Oklo to fuel its growing AI infrastructure and the "Prometheus" supercomputing cluster in Ohio. The collaboration with TerraPower involves financing the construction of two sodium-cooled reactors utilizing proprietary "Natrium" technology, providing 690 MW initially, with plans to expand to 2.1 GW by 2035. Meta has also entered an agreement with Oklo, a startup back
Jan 102 min read
Iran Tests National 'Whitelists' Amid Protests and Blackouts
Key Findings Iran has imposed a nationwide internet blackout amid widespread protests, severely restricting global connectivity. However, a limited surge of traffic was detected from select Iranian academic institutions, suggesting potential "whitelisting" tests. The fluctuations in connectivity for these academic networks indicate a strategic assessment of restricting global access to a limited elite. Tehran accounted for the majority of the observed academic traffic, likely
Jan 102 min read
Russian APT28 Runs Credential-Stealing Campaign Targeting Defense and Telecom Organizations
Key Findings Russian state-sponsored threat group APT28 (aka BlueDelta) linked to a fresh wave of credential harvesting attacks Targeting individuals associated with a Turkish energy and nuclear research agency, a European think tank, and organizations in North Macedonia and Uzbekistan Campaign leverages sophisticated phishing techniques to compromise accounts and steal user credentials Background APT28 is associated with the Main Directorate of the General Staff of the Armed
Jan 102 min read
bottom of page

