zero-day exploit
-
Read moreA critical PAN-OS vulnerability (CVE-2026-0300) in the User-ID Captive Portal allows unauthenticated remote code execution with root privileges. Limited exploitation has been linked to state-sponsored activity involving log tampering, Active Directory enumeration, and deployment of tunneling tools like EarthWorm and ReverseSocks5.
-
Read moreClaude Mythos AI is redefining cyber threats by discovering zero-day vulnerabilities and generating exploits faster than ever. Learn how businesses can stay protected.
-
Read moreRedSun zero-day exploits Windows Defender to gain SYSTEM access. Learn how NPAV EPS protects against zero-day and privilege escalation attacks.
-
Read moreOracle has confirmed a major data breach targeting its older Gen 1 servers, exposing sensitive authentication data, usernames, and hashed passwords. The attacker gained access using an old Java exploit and demanded a $20 million ransom.
-
Read moreFortinet FortiGate firewall devices are under attack due to a zero-day vulnerability. Hackers are exploiting exposed management interfaces on public networks, gaining unauthorized access, and compromising firewall configurations. Organizations must act quickly to secure their systems and prevent further damage.