Introduction On April 16, 2025, a critical security advisory was published regarding a vulnerability in the Erlang/OTP SSH server. This
Category: Exploits
Introduction In the fast-evolving world of artificial intelligence, tools like Langflow are helping developers create powerful AI-driven applications. However, a
Key Points What Happened? On April 15, 2025, 4Chan, a well-known anonymous imageboard, went offline after what appears to be
Key Points NOTE: Much of this article’s information including the POC and detection template was sourced from ProjectDiscovery Blog –
Key Points Introduction CVE-2025-29824 is a major security flaw in Windows systems, recently patched by Microsoft. Actively exploited, it poses
On April 8, 2025, the US Office of the Comptroller of the Currency (OCC) disclosed a significant breach involving hacked
Metasploit is the ultimate penetration testing tool dominating cybersecurity in 2025. With a massive library of real-world exploits and seamless
Key Points Overview A newly discovered zero-day vulnerability, known as CVE-2025-0282, has been found in Ivanti products like Connect Secure,
Key Points The Check Point Breach: A Detailed Analysis Overview On March 30, 2025, at 09:20 AM PDT, the cybersecurity
Direct Answer Overview On March 15, 2025, security researchers identified two malicious npm packages targeting the ethers library, a popular