SIEM as a Service
Home Search

exploit vulnerabilities - search results

If you're not happy with the results, please do another search
Hackers Leveraging Email Input Fields

Hackers Leveraging Email Input Fields to Exploit Vulnerabilities Ranging from XSS to SSRF

A surge in cyberattacks leveraging email input fields as a gateway to exploit a wide range of vulnerabilities, including Cross-Site Scripting (XSS), Server-Side Request...
Hackers Actively Targeting SonicWall, Zoho, F5 & Ivanti Systems

Hackers Actively Targeting SonicWall, Zoho, F5 & Ivanti Systems to Exploit Vulnerabilities 

A significant surge in cyberattacks targeting enterprise network appliances and remote access tools has put global organizations on high alert.  On March 28, 2025, GreyNoise...
Exploit Vulnerabilities in Active Directory

Hackers Poisoning DNS Responses to Exploit Vulnerabilities in Active Directory Environments

A new implementation of Kerberos relaying over HTTP has been unveiled, leveraging multicast poisoning to exploit vulnerabilities in Active Directory environments. The research, published...
Pwn2Own 0-day Vulnerabilities

VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited – Pwn2Own Day...

Security researchers uncovered critical zero-day vulnerabilities across major enterprise platforms during the second day of Pwn2Own Berlin 2025, earning a staggering $435,000 in bounties. The...
Jenkins Security Update

Jenkins Security Update Released With the Fixes for the Vulnerabilities that Exploit CI/CD Pipelines

The Jenkins project has issued a critical security advisory detailing vulnerabilities in five widely used plugins: Cadence vManager, DingTalk, Health Advisor by CloudBees, OpenID...
Five Actively Exploited Windows 0-Day

CISA Warns of Five Actively Exploited Windows 0-Day Vulnerabilities

CISA has issued an urgent alert after adding five new Microsoft Windows zero-day vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of...
Microsoft Patch Tuesday May 2025

Microsoft Patch Tuesday May 2025: 72 Vulnerabilities Fixed, Including 5 Actively Exploited Zero-Day

Microsoft has released its Patch Tuesday updates for May 2025, addressing a total of 78 vulnerabilities across its product ecosystem, with five identified as...
SAP Patch Tuesday - Patch for Actively Exploited

SAP May 2025 Patch Tuesday – Patch for Actively Exploited 0-Day & 15 Vulnerabilities

SAP's May 2025 Security Patch Day includes an urgent update to the previously released emergency patch for a critical zero-day vulnerability (CVE-2025-31324) that continues...

Mirai Botnet Actively Exploiting GeoVision IoT Devices Command Injection Vulnerabilities

The cybersecurity landscape has once again been disrupted by the resurgence of the notorious Mirai botnet, which has been actively exploiting command injection vulnerabilities...
CISA Releases ICS Advisories

CISA Releases ICS Advisories Targeting Vulnerabilities & Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has released two Industrial Control Systems (ICS) advisories today, addressing critical security vulnerabilities that could potentially impact...
SIEM as a Service

Recent Posts

PupkinStealer Attacks Windows System

PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files

A new information-stealing malware dubbed "PupkinStealer" has been identified by cybersecurity researchers, targeting sensitive user data through a straightforward yet effective approach. First observed...