EXPLOITATION 8
- Bad Connection Uncovering Global Telecom Exploitation by Covert Surveillance Actors
- The Mythos Inflection Point - Dealing With the Upcoming Vulnerability Disclosure Avalanche
- The Mythos Inflection Point - Dealing With the Upcoming Vulnerability Disclosure Avalanche and Compressed Exploitation Window
- Old tech, new vulnerabilities - NTLM abuse, ongoing exploitation in 2025
- Fortinet’s delayed alert on actively exploited defect put defenders at a disadvantage
- Critical Vulnerability Puts 60,000 Redis Servers at Risk of Exploitation
- Exposed JDWP Exploited in the Wild What Happens When Debug Ports Are Left Open
- Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure