Key Points NOTE: Much of this article’s information including the POC and detection template was sourced from ProjectDiscovery Blog –
Category: Exploits
Key Points Introduction CVE-2025-29824 is a major security flaw in Windows systems, recently patched by Microsoft. Actively exploited, it poses
On April 8, 2025, the US Office of the Comptroller of the Currency (OCC) disclosed a significant breach involving hacked
Metasploit is the ultimate penetration testing tool dominating cybersecurity in 2025. With a massive library of real-world exploits and seamless
Key Points Overview A newly discovered zero-day vulnerability, known as CVE-2025-0282, has been found in Ivanti products like Connect Secure,
Key Points The Check Point Breach: A Detailed Analysis Overview On March 30, 2025, at 09:20 AM PDT, the cybersecurity
Direct Answer Overview On March 15, 2025, security researchers identified two malicious npm packages targeting the ethers library, a popular
Key Points Vulnerability Overview CVE-2025-29927 is an authentication bypass issue in Next.js, a popular React framework for building web applications.
The GitHub ecosystem just took a brutal hit. On March 14, 2025, the widely-used tj-actions/changed-files GitHub Action—trusted by over 23,000
In an age where the Internet of Things (IoT) seamlessly merges with our daily routines, the smart toothbrush emerged as