Blog

  • ⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More

    ⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More

    Monday opens with a trust problem. A mail server flaw is under active use. A network control system was targeted. Trusted packages were poisoned. A fake model page pushed a stealer. Then came the familiar ransom claim: the data was returned and deleted.
    The pattern is clear. One weak dependency can leak keys. One leaked key can open cloud access. One cloud foothold can become a production

  • How to Reduce Phishing Exposure Before It Turns into Business Disruption

    How to Reduce Phishing Exposure Before It Turns into Business Disruption

    What happens when a phishing email looks clean enough to pass through security, but dangerous enough to expose the business after one click? That is the gap many SOCs still struggle with: the attacks that leave teams unsure what was exposed, who else was targeted, and how far the risk has spread.
    Early phishing detection closes that gap. It helps teams move from uncertainty to evidence faster,

  • Developer Workstations Are Now Part of the Software Supply Chain

    Developer Workstations Are Now Part of the Software Supply Chain

    Supply chain attackers are not only trying to slip malicious code into trusted software. They are trying to steal the access that makes trusted software possible. Recently, three separate campaigns hit npm, PyPI, and Docker Hub in a 48-hour window, and all three targeted secrets from developer environments and CI/CD pipelines, including API keys, cloud credentials, SSH keys, and tokens. This is

  • Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws

    Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws

    Ivanti, Fortinet, n8n, SAP, and VMware have released security fixes for various vulnerabilities that could be exploited by bad actors to bypass authentication and execute arbitrary code.
    Topping the list is a critical flaw impacting Ivanti Xtraction (CVE-2026-8043, CVSS score: 9.6) that could be exploited to achieve information disclosure or client-side attacks.
    “External control of a file name

  • MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems

    MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems

    Chaotic Eclipse, the security researcher behind the recently disclosed Windows flaws, YellowKey and GreenPlasma, has released a proof-of-concept (PoC) for a Windows privilege escalation zero-day flaw that grants attackers SYSTEM privileges on fully patched Windows systems.
    Codenamed MiniPlasma, the vulnerability impacts “cldflt.sys,” which refers to the Windows Cloud Files Mini Filter Driver,

  • NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE

    NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE

    A newly disclosed security flaw impacting NGINX Plus and NGINX Open has come under active exploitation in the wild, days after its public disclosure, according to VulnCheck.
    The vulnerability, tracked as CVE-2026-42945 (CVSS score: 9.2), is a heap buffer overflow in ngx_http_rewrite_module affecting NGINX versions 0.6.27 through 1.30.0. According to AI-native security company depthfirst, the

  • Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt

    Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt

    Grafana has disclosed that an “unauthorized party” obtained a token that granted them the ability to access the company’s GitHub environment and download its codebase.

    “Our investigation has determined that no customer data or personal information was accessed during this incident, and we have found no evidence of impact to customer systems or operations,” Grafana
    said
    in a series of

  • Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming

    Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming

    A critical security vulnerability impacting the
    Funnel Builder
    plugin for WordPress has come under active exploitation in the wild to
    inject malicious JavaScript code
    into WooCommerce checkout pages with the goal of stealing payment data.

    Details of the activity were
    published
    by Sansec this week. The vulnerability currently does not have an official CVE identifier. It

  • Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access

    Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access

    The Russian state-sponsored hacking group known as

    Turla

    has transformed its custom backdoor Kazuar into a modular peer-to-peer (P2P) botnet that’s engineered for stealth and persistent access to compromised hosts.

    Turla, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA), is assessed to be affiliated with Center 16 of Russia’s Federal Security Service (FSB)

  • Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence

    Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence

    Cybersecurity researchers have disclosed a set of four security flaws in OpenClaw that could be chained to achieve data theft, privilege escalation, and persistence.

    The vulnerabilities, collectively dubbed

    Claw Chain

    by Cyera, can permit an attacker to establish a foothold, expose sensitive data, and plant backdoors. A brief description of the flaws is below –