SIEM as a Service
iTunes 0-day Privilege Escalation Flaw Let Attackers Hack Windows

iTunes 0-day Privilege Escalation Flaw Let Attackers Hack Windows

iTunes is a media player which is developed by Apple Inc. and this application enables users to purchase, organize, and play digital music and videos.  It was launched in 2001 and revolutionized the way people...
Windows MSHTML Zero-Day Vulnerability Exploited In The Wild

Windows MSHTML Zero-Day Vulnerability Exploited In The Wild

The Windows MSHTML platform spoofing vulnerability, CVE-2024-43461, which affects all supported Windows versions, has been exploited in the wild. CVE-2024-43461 was used in attacks by the Void Banshee APT hacking group. Research from Trend Micro...
Exploitation Zero-Day Vulnerabilities Remote Access Became Prime Target

Exploitation Zero-Day Vulnerabilities For Remote Access Became Prime Target

The cybersecurity landscape in 2024 has been marked by a significant surge in malware and vulnerabilities.  The Key trends include the expansion of Ransomware-as-a-Service (RaaS), an increase in software supply chain attacks, and the exploitation...
Windows Smart App Control Zero-Day

Windows Smart App Control Zero-Day (CVE-2024-38217) Exploited Since 2018 Finally Fixed

Microsoft has addressed a critical zero-day vulnerability affecting its Windows Smart App Control (SAC) and SmartScreen security features. This vulnerability was fixed at Microsoft’s September 2024 Patch Tuesday, which addressed a significant number...
RomCom Office 0-Day Ransomware

RomCom Group Exploiting Microsoft Office 0-day To Deploy Ransomware

The Russian group RomCom, dubbed Storm-0978, distributes underground ransomware by leveraging the Microsoft Office and Windows HTML RCE zero-day vulnerability identified as CVE-2023-36884. This ransomware encrypts files on victims' Windows computers, similar to typical ransomware,...
Android Zero-Day Elevation of Privilege vulnerability

Actively Exploited Android Zero-Day Elevation of Privilege vulnerability Patched

Google has released a patch for a critical zero-day vulnerability, CVE-2024-32896, which was actively exploited in the wild. This vulnerability, classified as a high-severity elevation of privilege (EoP) flaw, was discovered in the Android...
North Korean Hackers Actively Exploiting Chromium RCE Zero-Day In The Wild

North Korean Hackers Actively Exploiting Chromium RCE Zero-Day In The Wild

Chromium is the foundation for many popular web browsers including Google Chrome and Microsoft Edge, and this is the most lucrative thing that attracts the hackers most. Cybersecurity analysts at Microsoft recently discovered that North...
Corona Mirai Botnet Exploiting RCE Zero-Day To Hire New Bots

Corona Mirai Botnet Exploiting RCE Zero-Day To Hire New Bots

A botnet is exploiting a new zero-day vulnerability, CVE-2024-7029, in AVTECH CCTV cameras to spread a Mirai variant, which is a command injection vulnerability in the brightness function that allows for remote code execution.  It...
Chinese Hackers Exploited Versa Director Zero-Day to Target IT Sectors, CISA Warns

Chinese Hackers Exploited Versa Director Zero-Day to Target IT Sectors, CISA Warns

Chinese state-sponsored threat actors have been exploiting a zero-day vulnerability in Versa Director servers, identified as CVE-2024-39717. This vulnerability, discovered by Black Lotus Labs at Lumen Technologies, has been actively targeted since June 2024, affecting...
Zero-Day Vulnerability In Arcadyan WiFi Devices Allows RCE for Root Access – Exploit Released

Zero-Day Vulnerability In Arcadyan WiFi Devices Allows RCE for Root Access – Exploit Released

A critical zero-day vulnerability has been identified in the Arcadyan FMIMG51AX000J model and potentially other devices affiliated with the WiFi Alliance. This flaw allows remote attackers to execute arbitrary code. An independent security researcher...
SIEM as a Service

Recent Posts

Malware Defense

Malware Defense 101 – Identifying and Removing Modern Threats

The cybersecurity landscape in 2025 is defined by increasingly sophisticated malware threats, with attackers leveraging artificial intelligence, evasion tactics, and polymorphic code to bypass...