Skip to content

TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe
Top Stories
CISA Adds Seven Vulnerabilities to KEV Catalog — April 13, 2026
April 14, 2026
Booking.com Confirms Data Breach
April 13, 2026
CVE-2026-34621: Adobe Acrobat Reader Prototype Pollution RCE
April 12, 2026
CISSP Executive Briefing: Adversary Speed vs Enterprise Speed
April 12, 2026
CISSP Domain 2: Zero Hour Cram Series
April 11, 2026
CISSP Domain 2 – Data Retention & Privacy – Why Keeping Data Too Long Is a Risk
April 10, 2026
Google Device Bound Session Credentials  — Now GA in Chrome 146
April 10, 2026
BlueHammer: When MSRC Process Failures Become Zero-Days
April 9, 2026
OpenSSL 3.6.2: The Moderate Severity Wave
April 8, 2026
CVE-2025-59528: Flowise CustomMCP Code Injection RCE
April 7, 2026
UNC4736 DRIFT: The Governance Failure Inside Multisig
April 6, 2026
CISSP Domain 1 Zero Hour Cram Series
April 5, 2026
CVE-2026-35616 — Fortinet FortiClient EMS Critical Pre-Auth RCE
April 5, 2026
TheCyberThrone CyberSecurity Newsletter Top 5 Articles –  March 2026
April 4, 2026
CISSP Domain 2 – Data Security Controls – How Classification Drives Protection
April 4, 2026
Beyond Prompts: Engineering the LLM Security Control Plane
April 3, 2026
Cisco Patches Two Critical and Six High-Severity Vulnerabilities
April 3, 2026
CVE-2026-5281 — Google Chrome Dawn Use-After-Free Under Active Exploitation
April 2, 2026
Anthropic Code Exposed in Two incidents
April 1, 2026
Axios npm Hijacked: 100 Million Weekly Downloads Turned Into a RAT Dropper
March 31, 2026
CISSP Executive Briefing: Beyond Patching
March 30, 2026
CISSP Domain 2 – Data Owner vs Custodian vs User
March 29, 2026
The PlayBook CISSP Never Gave you
March 29, 2026
CISSP Playbook — Domain 8 Software Development Security
March 28, 2026
CISA Adds CVE-2025-53521 F5 BIG-IP APM  to KEV
March 28, 2026
CISA adds Langflow and Trivy bugs to KEV Catalog
March 27, 2026
Guide to AI Red Teaming with MITRE ATLAS
March 27, 2026
Apple Patches numerous vulnerabilities across its products
March 26, 2026
TeamPCP Supply Chain Campaign
March 26, 2026
Wiped From Within The Stryker Aftermath
March 25, 2026
FCC Bans All New Foreign-Made Consumer Routers
March 25, 2026
CVE-2026-3055 – Citrix NetScaler Critical SAML IDP Memory Leak
March 24, 2026
The Pressure Trap: Iran, The Dollar, and America’s Self-Inflicted Wounds
March 24, 2026
Quest KACE SMA flaw CVE-2025-32975 Actively Exploited
March 23, 2026
The Script Behind the Stage: Prompt Leaking and the Secrets Your AI Holds
March 22, 2026
Oracle Patches CVE-2026-21992 — Unauthenticated RCE
March 22, 2026
CISSP Domain 2 – Why Data Classification Comes First
March 21, 2026
CISA adds Five Vulnerabilities to KEV Catalog- March 20, 2026
March 21, 2026
LeakNet Ransomware Dissection
March 20, 2026
CISA Adds CVE-2026-20131 to KEV that was Weaponized for 36 Days
March 20, 2026
This War Was a Choice but Consequences are not
March 19, 2026
The Exploit That Arrived in an Email and Left With Your Data
March 19, 2026
CISA adds Three Vulnerabilities to KEV Catalog
March 19, 2026
CISSP Playbook Domain 7: Security Operations
March 18, 2026
OpenClaw: The Open-Source AI Agent Rewriting the Threat Landscape
March 18, 2026
Politely Ask Your AI to Misbehave – It will Jailbreak the GuardRail
March 17, 2026
Adobe’s $150 Million Settlement: When Dark Patterns Become a Regulatory Liability
March 17, 2026
RAG Poisoning: When the Knowledge Base Becomes the Weapon
March 16, 2026
Drones Don’t Care About Your SLA: When Geopolitics Breaks the Cloud
March 15, 2026
The Prompt is the New Exploit: Prompt Engineering and the Agentic AI Threat Convergence
March 15, 2026
Middle East Conflict: Cyber Operations Surge
March 14, 2026
CISA Adds Two Google Chrome Zero-Days to KEV
March 14, 2026
CISSP Executive Briefing on Red Teaming
March 13, 2026
Apple Patches Coruna Exploit Kit — Older iOS/iPadOS Devices
March 13, 2026
Stryker Hit by Iran linked Handala
March 12, 2026
CISSP Playbook Domain 6: Security Assessment and Testing
March 11, 2026
Microsoft Patch Tuesday – March 2026
March 11, 2026
OpenAI Planned to Acquire Promptfoo
March 10, 2026
CISA KEV Catalog Update – March 9 2026
March 10, 2026
Termite Ransomware — Threat Intelligence and Technical Dissection
March 9, 2026
TheCyberThrone CyberSecurity Newsletter Top 5 Articles –  February 2026
March 8, 2026
Claude Code Security vs. OpenAI Codex Security – AI Arms Race
March 8, 2026
CISSP Executive Briefing: AI-Driven Threat Landscape Evolution
March 7, 2026
Cisco Catalyst SD-WAN — Active Exploitation Alert
March 7, 2026
CISA Adds Five Flaws to Its KEV Catalog
March 6, 2026
$2Millions Spent but Password123 Won – Fancy Fall of Security
March 5, 2026
Two Perfect 10s: Cisco FMC Under Siege
March 5, 2026
CISA adds Qualcomm and VMware Aria to KEV Catalog
March 4, 2026
CISSP Domain 1: Mastering Security and Risk Management – Blog and Podcast
March 3, 2026
Android’s Biggest Security Update Since 2018 — And an Exploit Already in the Wild
March 3, 2026
CISSP Domain 1 Wrap-Up – The Mental Model That Changes How You Think
March 2, 2026
CISSP Domain 1 – Business Impact Analysis
March 1, 2026
CISSP Domain 1 – Business Continuity vs Disaster Recovery
February 28, 2026
CVE-2026-21902 — Juniper PTX One Packet to Root Vulnerability
February 28, 2026
CISSP Playbook – Domain 5: Identity and Access Management
February 27, 2026
CISA Adds Cisco SD-WAN Vulnerabilities to KEV Catalog
February 26, 2026
Google has fixed triple high severity flaws in Chrome
February 25, 2026
CISSP Domain 1 – Ethics & the ISC² Code of Ethics
February 24, 2026
PayPal Data Breach-Six Months of Silent Exposure
February 23, 2026
CISSP Domain 1 – Why Passing Audits ≠ Being Secure
February 22, 2026
CISSP Domain 1 – Policies, Standards, Guidelines & Procedures
February 21, 2026
Microsoft CVE-2026-26119 Deep Dive
February 20, 2026
CISSP Executive Briefing on GRC
February 19, 2026
Palo Alto Intent to Bolster AI Security with Koi Acquisition
February 19, 2026
Betterment Suffers a Data Breach
February 19, 2026
CISA adds four vulnerabilities to KEV Catalog- Feb 17, 2026
February 18, 2026
CISSP Domain 1 – Risk Treatment Options
February 17, 2026
Google Patches First Chrome Zero-Day of 2026
February 17, 2026
CISSP Domain 1 : Threat vs Vulnerability vs Risk – Confused Trio
February 16, 2026
CISSP Domain 1: Governance vs Management
February 15, 2026
CISSP Domain 1 – CIA Triad Concept
February 15, 2026
What CISSP Really Tests: Mindset Over Memory
February 14, 2026
The Dark side of AI Caricatures
February 14, 2026
CISSP Executive Briefing: Invisible Cloud Visible Risk
February 13, 2026
CISA KEV Catalog Update Feb 12 2026
February 13, 2026
Odido Data Breach: 6.2 Million Customers Exposed
February 13, 2026
Apple Patch Tuesday – February 2026
February 12, 2026
Critical SQL Injection in FortiClientEMS: CVE-2026-21643
February 12, 2026
Microsoft Patch Tuesday February 2026
February 11, 2026
CISSP Playbook – Domain 4: Communication & Network Security
February 10, 2026

CISA Adds Seven Vulnerabilities to KEV Catalog — April 13, 2026

CISA has expanded the Known Exploited Vulnerabilities catalog with seven new entries on April 13, 2026, based on evidence of active exploitation. The batch spans three vendors — Microsoft, Adobe,…
Continue Reading
Posted by PravinKarthik April 14, 2026

Booking.com Confirms Data Breach

On April 13, 2026, Booking.com confirmed that unauthorized third parties accessed customer booking information. The company began notifying affected users via email on Sunday evening, stating it had detected "suspicious…
Continue Reading
Posted by PravinKarthik April 13, 2026

CVE-2026-34621: Adobe Acrobat Reader Prototype Pollution RCE

Vulnerability Summary A critical Prototype Pollution vulnerability (CWE-1321) affecting Adobe Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier, capable of arbitrary code execution in the context of the current user. Severity…
Continue Reading
Posted by PravinKarthik April 12, 2026
Posted inCISSP

CISSP Executive Briefing: Adversary Speed vs Enterprise Speed

When Time Becomes the Primary Attack Vector Executive Reality Most modern breaches succeed not because defenses are weak —but because responses are slow. A vulnerability is disclosed.Within hours, exploit code…
Continue Reading
Posted by PravinKarthik April 12, 2026
Posted inCISSP

CISSP Domain 2: Zero Hour Cram Series

Asset Security | Final 48-Hour Decision System Most candidates don’t fail Domain 2 because they don’t know controls. They fail because they misjudge data value, ownership, and lifecycle decisions. Domain…
Continue Reading
Posted by PravinKarthik April 11, 2026
Posted inCISSP

CISSP Domain 2 – Data Retention & Privacy – Why Keeping Data Too Long Is a Risk

When organisations think about data security, they focus on protecting it. But CISSP asks a different question: What if the real risk… is keeping data longer than necessary? The Hidden…
Continue Reading
Posted by PravinKarthik April 10, 2026
Most Prolific Ransomware Groups in 2024 Analysis
Posted inYear 2024

Most Prolific Ransomware Groups in 2024 Analysis

In 2024, ransomware attacks grew in sophistication, aggression, and unpredictability. The number of ransomware gangs increased, targeting larger organizations and demanding higher ransoms. These malicious groups focused on critical infrastructure…
Posted by PravinKarthik December 20, 2024
CISA adds BeyondTrust CVE-2024-12356 to its KEV Catalog

CISA adds BeyondTrust CVE-2024-12356 to its KEV Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-12356: Command Injection Vulnerability in BeyondTrust PRA and RS Overview: CVE-2024-12356 is a…
Posted by PravinKarthik December 20, 2024
Fortinet fixes several vulnerabilities including CVE-2023-34990

Fortinet fixes several vulnerabilities including CVE-2023-34990

Fortinet has released patches for vulnerabilities affecting its popular products, including FortiClient VPN, FortiManager, and FortiWLM. These flaws range from password exposure to remote code execution and unauthorized file access,…
Posted by PravinKarthik December 19, 2024
State of the Art New Ransomware Families in 2024 analysis
Posted inYear 2024

State of the Art New Ransomware Families in 2024 analysis

The ransomware industry remains the number one threat to organizations worldwide. The supply chain attacks became a solid technique for the mature and experienced ransomware groups. Although we have seen increased activity…
Posted by PravinKarthik December 19, 2024
Microsoft Teams was leaveraged to spread DarkGate malware

Microsoft Teams was leaveraged to spread DarkGate malware

A sophisticated cyberattack using DarkGate malware was discovered being distributed through a vishing (voice phishing) technique via Microsoft Teams. This method marked a significant evolution in the distribution of DarkGate,…
Posted by PravinKarthik December 19, 2024
CISA KEV Catalog Update Part V – December 2024

CISA KEV Catalog Update Part V – December 2024

The US CISA has added the following vulnerabilities to its Known Exploited Vulnerabilities Catalog based on the evidence of active exploitation CVE-2018-14933  CVE-2018-14933 with a CVSS score of 9.8 and…
Posted by PravinKarthik December 19, 2024
Apache Tomcat fixes CVE-2024-50379 and CVE-2024-54677

Apache Tomcat fixes CVE-2024-50379 and CVE-2024-54677

The Apache Software Foundation has released patches to mitigate two newly discovered vulnerabilities in Apache Tomcat, an extensively used open-source web server and servlet container. These vulnerabilities could potentially jeopardize…
Posted by PravinKarthik December 18, 2024
Exploit Code for Apache Struts CVE-2024-53677 released

Exploit Code for Apache Struts CVE-2024-53677 released

The proof-of-concept (PoC) exploit code for the critical Apache Struts vulnerability, designated as CVE-2024-53677, has been released. This vulnerability poses a severe risk to systems running Apache Struts versions 2.0.0…
Posted by PravinKarthik December 18, 2024

Posts pagination

Previous page 1 … 110 111 112 113 114 … 712 Next page
Trending post
  • CVE-2026-34621: Adobe Acrobat Reader Prototype Pollution RCE
    CVE-2026-34621: Adobe Acrobat Reader Prototype Pollution RCE
  • BlueHammer: When MSRC Process Failures Become Zero-Days
    BlueHammer: When MSRC Process Failures Become Zero-Days
  • Booking.com Confirms Data Breach
    Booking.com Confirms Data Breach
  • CISSP Executive Briefing: Adversary Speed vs Enterprise Speed
    CISSP Executive Briefing: Adversary Speed vs Enterprise Speed
  • Google Device Bound Session Credentials  — Now GA in Chrome 146
    Google Device Bound Session Credentials  — Now GA in Chrome 146
  • CISSP Domain 2 – Data Retention & Privacy – Why Keeping Data Too Long Is a Risk
    CISSP Domain 2 – Data Retention & Privacy – Why Keeping Data Too Long Is a Risk
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top