My Courses
-

A significant remote code execution vulnerability in Trend Micro Apex One Management is currently being actively exploited in real-world scenarios.
Critical command injection remote code execution (RCE) vulnerabilities in Trend Micro Apex One Management Console are currently being actively exploited by threat actors. The company…
-

A zero-day vulnerability in Adobe AEM Forms allows attackers to execute arbitrary code.
Adobe has issued an urgent security update for Adobe Experience Manager Forms on Java Enterprise Edition (JEE) to address two critical zero-day vulnerabilities, CVE-2025-54253 and…
-

Microsoft has introduced Project Ire, an initiative designed to automatically identify malware using artificial intelligence technologies.
On Tuesday, Microsoft announced the development of an autonomous artificial intelligence (AI) agent designed to analyse and classify software independently, aiming to enhance malware detection…
-

A recent report shows that AI has reduced the workloads for virtual Chief Information Security Officers (vCISOs) by 68%, responding to the increasing demands from small and medium-sized businesses (SMBs).
As the volume and sophistication of cyber threats continue to escalate, cybersecurity has become essential for businesses of all sizes. Small and Medium-sized Businesses (SMBs)…
-

Trend Micro has verified that critical vulnerabilities in Apex One on-premise systems are being actively exploited.
Trend Micro has announced mitigations for critical security vulnerabilities in the on-premise versions of Apex One Management Console, which have reportedly been exploited in the…
-

CERT-UA alerts about malware attacks delivered through HTA files, utilizing court summons as bait.
The Computer Emergency Response Team of Ukraine (CERT-UA) has issued a warning regarding cyber attacks conducted by a threat actor known as UAC-0099. This group…
-

CISA has included three D-Link vulnerabilities in its Known Exploited Vulnerabilities (KEV) Catalog due to indications of ongoing exploitation.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently added three significant security vulnerabilities affecting D-Link routers to its Known Exploited Vulnerabilities (KEV) catalog, following…
-

CISA has published two advisories addressing vulnerabilities and exploits related to Industrial Control Systems (ICS).
On August 5, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) issued two urgent advisories regarding critical vulnerabilities in Industrial Control Systems (ICS) that could…



