Skip to content
TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

Posts by PravinKarthik

  • Home
  • PravinKarthik
  • Page 6
About PravinKarthik
Cybersecurity Enthusiasts . Will keep update on all happenings around in Security Operations.
Ivanti EPMM Zero-Days CVE-2026-1281 & CVE-2026-1340

Ivanti EPMM Zero-Days CVE-2026-1281 & CVE-2026-1340

Ivanti has issued a critical security advisory for two zero-day remote code execution (RCE) vulnerabilities in Endpoint Manager Mobile (EPMM), actively exploited in the wild. CVE-2026-1281 joined CISA's Known Exploited…
Posted by PravinKarthik January 31, 2026
Critical SolarWinds Web Help Desk Vulnerabilities

Critical SolarWinds Web Help Desk Vulnerabilities

SolarWinds has released a critical security advisory addressing multiple severe vulnerabilities in its Web Help Desk (WHD) platform that impact versions prior to 2026.1. Among the six issues patched, four…
Posted by PravinKarthik January 30, 2026
Dissecting CVE-2026-22709: The Zombie Exploit in Node.js vm2

Dissecting CVE-2026-22709: The Zombie Exploit in Node.js vm2

CVE-2026-22709 represents a critical sandbox escape vulnerability in the widely used vm2 Node.js library, allowing attackers to achieve remote code execution (RCE) on host systems.This flaw revives concerns about vm2's…
Posted by PravinKarthik January 29, 2026
Nike’s Data Breach: WorldLeaks Strikes the Sportswear Giant

Nike’s Data Breach: WorldLeaks Strikes the Sportswear Giant

A massive cybersecurity incident has rocked Nike, with the extortion group WorldLeaks claiming responsibility for stealing and leaking over 1.4TB of internal data—nearly 190,000 files. The breach, which reportedly dates…
Posted by PravinKarthik January 28, 2026
CVE-2026-24858: Fortinet FortiCloud SSO Zero-Day Under Active Exploitation

CVE-2026-24858: Fortinet FortiCloud SSO Zero-Day Under Active Exploitation

A critical authentication bypass vulnerability, CVE-2026-24858, impacts multiple Fortinet products via flawed FortiCloud SSO controls. Fortinet confirmed active exploitation by malicious accounts before patches rolled out this week. Vulnerability Overview…
Posted by PravinKarthik January 28, 2026
Crunchbase Data Breach: ShinyHunters Exposes 2M+ Records

Crunchbase Data Breach: ShinyHunters Exposes 2M+ Records

The startup intelligence platform Crunchbase confirmed a significant data breach on January 26, 2026, following claims by the notorious ShinyHunters hacking group. They leaked a 402 MB archive containing over…
Posted by PravinKarthik January 27, 2026
CISA KEV Catalog Update – 5 Vulnerabilities Added

CISA KEV Catalog Update – 5 Vulnerabilities Added

1) CVE-2018-14634 – Linux Kernel Integer Overflow (Local Privilege Escalation) Type: Integer overflow in the Linux kernel’s create_elf_tables() function.Impact: A local, unprivileged user with access to a SUID or privileged…
Posted by PravinKarthik January 27, 2026
CISSP Executive Briefing: Cyber Insurance Strategy & Pitfalls
Posted inCISSP

CISSP Executive Briefing: Cyber Insurance Strategy & Pitfalls

Risk Transfer or Risk Illusion? Executive Summary Cyber insurance has rapidly become a board-level risk control. Many organizations now treat it as a financial safety net against breaches, ransomware, regulatory…
Posted by PravinKarthik January 26, 2026

Posts pagination

Previous page 1 … 4 5 6 7 8 … 703 Next page
Trending post
  • CISSP Playbook – Domain 5: Identity and Access Management
    CISSP Playbook – Domain 5: Identity and Access Management
  • CISSP Domain 1 - Why Passing Audits ≠ Being Secure
    CISSP Domain 1 - Why Passing Audits ≠ Being Secure
  • PayPal Data Breach-Six Months of Silent Exposure
    PayPal Data Breach-Six Months of Silent Exposure
  • CISSP Domain 1 - Ethics & the ISC² Code of Ethics
    CISSP Domain 1 - Ethics & the ISC² Code of Ethics
  • CISSP Domain 1 - Policies, Standards, Guidelines & Procedures
    CISSP Domain 1 - Policies, Standards, Guidelines & Procedures
  • CVE-2026-21902 — Juniper PTX One Packet to Root Vulnerability
    CVE-2026-21902 — Juniper PTX One Packet to Root Vulnerability
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top