NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE
Sun, 17 May 2026 17:27:53 +0530
Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt
Sun, 17 May 2026 12:43:33 +0530
Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming
Sat, 16 May 2026 20:50:48 +0530
Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access
Fri, 15 May 2026 22:40:25 +0530
Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence
Fri, 15 May 2026 19:05:04 +0530
What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface
Fri, 15 May 2026 16:30:00 +0530
TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates
Fri, 15 May 2026 16:24:44 +0530
On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email
Fri, 15 May 2026 11:49:04 +0530
CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits
Fri, 15 May 2026 10:58:03 +0530
Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access
Thu, 14 May 2026 23:15:20 +0530
Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets
Thu, 14 May 2026 22:52:43 +0530
ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories
Thu, 14 May 2026 21:37:46 +0530
Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike
Thu, 14 May 2026 19:30:37 +0530
PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure
Thu, 14 May 2026 17:10:14 +0530
Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation
Thu, 14 May 2026 14:55:50 +0530
New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption
Thu, 14 May 2026 12:36:15 +0530
Microsoft's MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday
Wed, 13 May 2026 19:16:02 +0530
Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation
Wed, 13 May 2026 18:30:00 +0530
Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws
Wed, 13 May 2026 16:06:10 +0530
GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data
Wed, 13 May 2026 13:38:54 +0530
Share this story
The key features and benefits of Endpoint Detection and Response (EDR).
LEARN MOREGoogle's global exhibition of inspiration, innovation, and education
LEARN MOREIndustry 4.0, the Fourth Industrial Revolution, and 4IR.
LEARN MOREExplore how cutting-edge technologies empower business at the AWS Summit.
LEARN MORELeverage trends, strategies, and predictions to give your business a competitive edge.
LEARN MOREHow to scale from VMs to Kubernetes.
LEARN MORELet us know what you think about the article.