CVE-2025-61932 Exploitation: A New Critical Motex LANSCOPE Endpoint Manager Vulnerability Used in Real-World Attacks Threats In the wake of confirmed exploits targeting two Microsoft Edge… rooter October 27, 2025 3 min read 0
CVE-2025-12036 Vulnerability: A New Critical Chrome V8 JavaScript Engine Flaw Enables Attackers to Execute Remote Code on Vulnerable Systems Threats Remote code execution (RCE) vulnerabilities pose significant security threats, including… rooter October 24, 2025 4 min read 0
CVE-2025-40778 and CVE-2025-40780: Cache Poisoning Vulnerabilities in BIND 9 Expose DNS Servers to the Risk of Attacks Threats Just days after the disclosure of CVE-2025-59230 and CVE-2025-24990 zero-day… rooter October 23, 2025 5 min read 0
MITRE Attack Flow v3.0.0 Threats The cybersecurity landscape is constantly changing, and understanding complex attack… rooter October 22, 2025 13 min read 0
CVE-2025-59230 and CVE-2025-24990 Vulnerabilities: New Windows Zero-Days Under Active Exploitation Threats Hot on the heels of the disclosure of CVE-2025-11001 and… rooter October 16, 2025 4 min read 0
UAC-0239 Activity Detection: Targeted Spearphishing Attacks Against Defense Forces and State Bodies of Ukraine via the OrcaC2 Framework and FILEMESS Stealer Threats CERT-UA has observed a wave of increasing offensive activity leveraging… rooter October 15, 2025 5 min read 0
CVE-2025-11001 and CVE-2025-11002 Vulnerabilities: Critical Flaws in 7-Zip Enable Remote Code Execution Threats As this fall season brings a surge of newly disclosed… rooter October 14, 2025 4 min read 0
CVE-2025-43300 Vulnerability: Zero-Day in iOS, iPadOS, and macOS Under Active Exploitation Threats As the season shifts from summer to fall, the cyber… rooter August 21, 2025 4 min read 0
CVE-2025-9074: Critical Vulnerability in Docker Desktop Enables Local Container Access to Docker Engine API via Subnet Threats Docker is one of the backbones of modern enterprise infrastructure,… rooter August 21, 2025 3 min read 0
Crypto24 Ransomware Detection: Hackers Hit Large Organizations via Legitimate Tools and Custom Malware to Stay Under the Radar Threats Ransomware continues to rank among the most critical cyber threats.… rooter August 18, 2025 5 min read 0