Blog

  • DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability

    DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability

    Proof-of-concept (PoC) exploit code has now been released for a recently patched security flaw in the Linux kernel that could allow for local privilege escalation (LPE).
    Dubbed DirtyDecrypt (aka DirtyCBC), the vulnerability was discovered and reported by the Zellic and V12 security team on May 9, 2026, only to be informed by the maintainers that it was a duplicate of a vulnerability that had

  • The New Phishing Click: How OAuth Consent Bypasses MFA

    The New Phishing Click: How OAuth Consent Bypasses MFA

    In February 2026, a phishing-as-a-service (PhaaS) platform called EvilTokens went live. Within five weeks, it had compromised more than 340 Microsoft 365 organizations across five countries. 

    The targets of the platform received a message asking them to enter a short code at microsoft.com/devicelogin and complete their normal MFA challenge, then walked away believing they had verified a

  • Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare

    Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare

    Drupal has issued an alert stating that it intends to release a “core security release” for all supported branches on May 20, 2026, from 5-9 p.m. UTC.

    “The Drupal Security Team urges you to reserve time for core updates at that time because exploits might be developed within hours or days,” the maintainers of the PHP-based content management system (CMS) said.

    “Not all configurations are

  • SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access

    SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access

    Critical security vulnerabilities have been disclosed in SEPPMail Secure E-Mail Gateway, an enterprise-grade email security solution, that could be exploited to achieve remote code execution and enable an attacker to read arbitrary mails from the virtual appliance.
    “These vulnerabilities could have been exploited to read all mail traffic or as an entry vector into the internal network,”

  • Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer

    Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer

    Cybersecurity researchers have flagged a compromised version of the Nx Console extension that was published to the Microsoft Visual Studio Code (VS Code) Marketplace.

    The extension in question is rwl.angular-console (version 18.95.0), a popular user interface and plugin for code editors like VS Code, Cursor, and JetBrains. The VS Code extension has more than 2.2 million installations. The Open

  • ⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More

    ⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More

    Monday opens with a trust problem. A mail server flaw is under active use. A network control system was targeted. Trusted packages were poisoned. A fake model page pushed a stealer. Then came the familiar ransom claim: the data was returned and deleted.
    The pattern is clear. One weak dependency can leak keys. One leaked key can open cloud access. One cloud foothold can become a production

  • How to Reduce Phishing Exposure Before It Turns into Business Disruption

    How to Reduce Phishing Exposure Before It Turns into Business Disruption

    What happens when a phishing email looks clean enough to pass through security, but dangerous enough to expose the business after one click? That is the gap many SOCs still struggle with: the attacks that leave teams unsure what was exposed, who else was targeted, and how far the risk has spread.
    Early phishing detection closes that gap. It helps teams move from uncertainty to evidence faster,

  • Developer Workstations Are Now Part of the Software Supply Chain

    Developer Workstations Are Now Part of the Software Supply Chain

    Supply chain attackers are not only trying to slip malicious code into trusted software. They are trying to steal the access that makes trusted software possible. Recently, three separate campaigns hit npm, PyPI, and Docker Hub in a 48-hour window, and all three targeted secrets from developer environments and CI/CD pipelines, including API keys, cloud credentials, SSH keys, and tokens. This is

  • Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws

    Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws

    Ivanti, Fortinet, n8n, SAP, and VMware have released security fixes for various vulnerabilities that could be exploited by bad actors to bypass authentication and execute arbitrary code.
    Topping the list is a critical flaw impacting Ivanti Xtraction (CVE-2026-8043, CVSS score: 9.6) that could be exploited to achieve information disclosure or client-side attacks.
    “External control of a file name

  • MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems

    MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems

    Chaotic Eclipse, the security researcher behind the recently disclosed Windows flaws, YellowKey and GreenPlasma, has released a proof-of-concept (PoC) for a Windows privilege escalation zero-day flaw that grants attackers SYSTEM privileges on fully patched Windows systems.
    Codenamed MiniPlasma, the vulnerability impacts “cldflt.sys,” which refers to the Windows Cloud Files Mini Filter Driver,