Skip to content
TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

Security

  • Home
  • Security
  • Page 8
North Korean PurpleBravo Targets Developers in Contagious Interview Campaign

North Korean PurpleBravo Targets Developers in Contagious Interview Campaign

PurpleBravo, a North Korean state-sponsored threat group, has escalated its cyber espionage efforts by targeting software developers through fake job interviews. Linked to the "Contagious Interview" campaign first noted in…
Posted by PravinKarthik February 1, 2026
Ivanti EPMM Zero-Days CVE-2026-1281 & CVE-2026-1340

Ivanti EPMM Zero-Days CVE-2026-1281 & CVE-2026-1340

Ivanti has issued a critical security advisory for two zero-day remote code execution (RCE) vulnerabilities in Endpoint Manager Mobile (EPMM), actively exploited in the wild. CVE-2026-1281 joined CISA's Known Exploited…
Posted by PravinKarthik January 31, 2026
Critical SolarWinds Web Help Desk Vulnerabilities

Critical SolarWinds Web Help Desk Vulnerabilities

SolarWinds has released a critical security advisory addressing multiple severe vulnerabilities in its Web Help Desk (WHD) platform that impact versions prior to 2026.1. Among the six issues patched, four…
Posted by PravinKarthik January 30, 2026
Dissecting CVE-2026-22709: The Zombie Exploit in Node.js vm2

Dissecting CVE-2026-22709: The Zombie Exploit in Node.js vm2

CVE-2026-22709 represents a critical sandbox escape vulnerability in the widely used vm2 Node.js library, allowing attackers to achieve remote code execution (RCE) on host systems.This flaw revives concerns about vm2's…
Posted by PravinKarthik January 29, 2026
Nike’s Data Breach: WorldLeaks Strikes the Sportswear Giant

Nike’s Data Breach: WorldLeaks Strikes the Sportswear Giant

A massive cybersecurity incident has rocked Nike, with the extortion group WorldLeaks claiming responsibility for stealing and leaking over 1.4TB of internal data—nearly 190,000 files. The breach, which reportedly dates…
Posted by PravinKarthik January 28, 2026
CVE-2026-24858: Fortinet FortiCloud SSO Zero-Day Under Active Exploitation

CVE-2026-24858: Fortinet FortiCloud SSO Zero-Day Under Active Exploitation

A critical authentication bypass vulnerability, CVE-2026-24858, impacts multiple Fortinet products via flawed FortiCloud SSO controls. Fortinet confirmed active exploitation by malicious accounts before patches rolled out this week. Vulnerability Overview…
Posted by PravinKarthik January 28, 2026
Crunchbase Data Breach: ShinyHunters Exposes 2M+ Records

Crunchbase Data Breach: ShinyHunters Exposes 2M+ Records

The startup intelligence platform Crunchbase confirmed a significant data breach on January 26, 2026, following claims by the notorious ShinyHunters hacking group. They leaked a 402 MB archive containing over…
Posted by PravinKarthik January 27, 2026
CISA KEV Catalog Update – 5 Vulnerabilities Added

CISA KEV Catalog Update – 5 Vulnerabilities Added

1) CVE-2018-14634 – Linux Kernel Integer Overflow (Local Privilege Escalation) Type: Integer overflow in the Linux kernel’s create_elf_tables() function.Impact: A local, unprivileged user with access to a SUID or privileged…
Posted by PravinKarthik January 27, 2026

Posts pagination

Previous page 1 … 6 7 8 9 10 … 399 Next page
Trending post
  • The PlayBook CISSP Never Gave you
    The PlayBook CISSP Never Gave you
  • CISSP Playbook — Domain 8 Software Development Security
    CISSP Playbook — Domain 8 Software Development Security
  • CISSP Domain 2 - Data Owner vs Custodian vs User
    CISSP Domain 2 - Data Owner vs Custodian vs User
  • CISSP Executive Briefing: Beyond Patching
    CISSP Executive Briefing: Beyond Patching
  • Axios npm Hijacked: 100 Million Weekly Downloads Turned Into a RAT Dropper
    Axios npm Hijacked: 100 Million Weekly Downloads Turned Into a RAT Dropper
  • Guide to AI Red Teaming with MITRE ATLAS
    Guide to AI Red Teaming with MITRE ATLAS
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top