fp-6b
-
Read moreSurvey shows 81% haven't changed router passwords—learn about malware risks, attack methods, and simple steps to secure your home network.
-
Read moreTrend Micro exposes "Zero Disco" attacks exploiting CVE-2025-20352 for rootkit deployment on Cisco devices—learn quick fixes like patching and EDR to safeguard against remote code execution and data theft risks.
-
Read moreCVE-2025-61984 exploits OpenSSH's ProxyCommand by injecting newlines in usernames for RCE, bypassing CVE-2023-51385; targets Bash-like shells in malicious Git submodules during recursive clones. Affects unquoted %r configs (e.g., from Teleport)—upgrade to OpenSSH 10.1, quote '%r', or restrict Git SSH to mitigate.
-
Read moreCISA details threat actors exploiting CVE-2024-36401 in GeoServer for initial access to a U.S. federal network on July 11, 2024, using webshells, dirtycow escalation, and lateral movement—undetected until July 31. Key lessons: Immediate KEV patching, enhanced IR plans, and continuous EDR monitoring.
-
Read moreThe Pixie Dust attack targets vulnerabilities in Wi-Fi Protected Setup (WPS) to recover router PINs offline, allowing attackers to access wireless networks. Disabling WPS or updating firmware is essential to prevent this exploit.
-
Read moreA severe vulnerability in LG WebOS smart TVs enables attackers on the local network to bypass authentication, gain root access, and fully compromise the device. Update your firmware immediately to protect your TV.
-
Read moreFastNetMon detected and helped stop a massive 1.5 billion packets-per-second UDP flood targeting a Western European DDoS mitigation provider. Learn about this record-breaking attack and defense strategies.
-
Read moreA severe remote code execution vulnerability in Progress OpenEdge AdminServer’s Java RMI interface (CVE-2025-7388) lets attackers execute commands with elevated privileges. Update to LTS versions 12.2.18 or 12.8.9 immediately.
-
Read moreFortinet users are being warned of potential cyberattacks targeting their VPN tools. Learn about the latest threats, how to identify them, and steps to take to protect your network.
-
Read moreDiscover how RingReaper, a sophisticated malware strain, targets Linux environments and evades traditional endpoint detection and response systems using advanced techniques. Learn about its impact on security.