EXPLOITATION 5
- Old tech, new vulnerabilities - NTLM abuse, ongoing exploitation in 2025
- Fortinet’s delayed alert on actively exploited defect put defenders at a disadvantage
- Critical Vulnerability Puts 60,000 Redis Servers at Risk of Exploitation
- Exposed JDWP Exploited in the Wild What Happens When Debug Ports Are Left Open
- Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure