Malicious Software | Supply Chain Attack | Vulnerability Exploitation s1ngularity Nx attack exposes GitHub credentials
Remote Code Execution | Software Update Recommendations | Vulnerability Exploitation Git vulnerability CVE-2025-48384 allows remote code execution
Cloud Security Threats | Cyber Espionage | Vulnerability Exploitation Chinese hacker groups Murky, Genesis, and Glacial Panda targeting cloud computing and telecommunications
3D Product Configurators | Network Security Risks | State-Sponsored Cyber Threats | Vulnerability Exploitation FBI alleges Russian APT group exploiting old Cisco vulnerability (CVE-2018-0171)
Cybersecurity Threats | SAP Security Risks | Vulnerability Exploitation SAP Netweaver exploits CVE-2025-31324 and CVE-2025-42999 publicly released
Ransomware Trends | Targeted Sectors | Vulnerability Exploitation In July, Qilin Ransomware has emerged as a significant threat, claiming over 70 victims.
Attack Methodologies | Cyber Threats | Vulnerability Exploitation EncryptHub using Brave Support Platform to weaponise MMC vulnerability
Brute-Force Attacks | Cybersecurity Threats | Vulnerability Exploitation Global brute-force attack targeting Fortinet SSL VPNs
Cybersecurity | Industrial Control Systems | Vulnerability Exploitation Operational Technology (OT) networks are being extensively targeted due to vulnerabilities found in Erlang/OTP.
AI Security | Vulnerability Exploitation Red Teams have successfully bypassed GPT-5’s safeguards, cautioning that it has become ‘almost impractical’ for business use.
Cybersecurity Threats | Malware Development | Vulnerability Exploitation Chinese cybercriminals are taking advantage of vulnerabilities in SharePoint to launch toolsets that include backdoors, ransomware, and loaders.
Cloud Security Risks | Financial Data Manipulation | Vulnerability Exploitation A newly discovered vulnerability in Streamlit enables cybercriminals to execute cloud account takeover attacks.
Cybersecurity Threats | Remote Code Execution | Vulnerability Exploitation Cybercriminals have the ability to access IIS machine keys by taking advantage of a vulnerability in SharePoint’s deserialization process.
AI Security Risks | Remote Code Execution | Vulnerability Exploitation A vulnerability chain in NVIDIA Triton has the potential to allow attackers to gain control over AI servers.
Cybersecurity Threats | Ransomware Attacks | Vulnerability Exploitation SonicWall VPNs are being actively targeted due to a zero-day vulnerability that allows attackers to circumvent multi-factor authentication (MFA) and install ransomware.
Code Auditing | Kernel Security | Vulnerability Exploitation Researchers took advantage of kernelCTF instances on Google and a zero-day vulnerability in Debian 12.