Our news
-
Vulnerability Summary for the Week of December 22, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Patch Info 9786–phpok3w A vulnerability was identified in 9786 phpok3w up to 901d96a06809fb28b17f3a4362c59e70411c933c. Impacted is an unknown function of the file show.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly
-
Vulnerability Summary for the Week of December 15, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Patch Info Cisco–Cisco Secure Email Cisco is aware of a potential vulnerability. Cisco is currently investigating and will update these details as appropriate as more information becomes available. 2025-12-17 10 CVE-2025-20393 cisco-sa-sma-attack-N9bf4 Hewlett Packard Enterprise (HPE)–HPE OneView A remote code execution issue exists in HPE OneView.
-

What is Email Bombing?
Email bombing is a disruptive tactic in which a threat actor deliberately floods a victim’s inbox with thousands of unsolicited or automated messages in a short period of time. Discovering your inbox under an email bombing attack requires fast, deliberate action. Threat actors use email bombing as a tool for disruption and facilitation of further
-
Vulnerability Summary for the Week of December 8, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Patch Info Unknown–Typora Typora 1.7.4 contains a command injection vulnerability in the PDF export preferences that allows attackers to execute arbitrary system commands. Attackers can inject malicious commands into the ‘run command’ input field during PDF export to achieve remote code execution. 2025-12-12 9.8
-

CTFs as a Training Tool for Blue-Space Operators
What is Capture the Flag (CTF)? If you do not already know or if you are new to cybersecurity, a CTF is essentially a simulated challenge where participants must solve puzzles or investigate clues to locate the “flag.” Most events use a jeopardy-style board with categories such as: Other formats use an attack-and-defend model where
-
MyDoom.B Virus
Systems Affected Any system running Microsoft Windows (Windows 95 and newer) that are used for reading email or accessing peer-to-peer file sharing services. Overview A new variant of the previously discovered MyDoom virus, MyDoom.B, has been identified. In addition to the common traits of email-borne viruses, this virus may prevent your computer
-
Multiple Vulnerabilities in Microsoft Internet Explorer
Systems Affected Microsoft Windows systems running Internet Explorer 5.01 Internet Explorer 5.50 Internet Explorer 6 Previous versions that are no longer supported may also be affected. Overview Microsoft Internet Explorer (IE) contains multiple vulnerabilities, the most serious of which could allow attackers in any location to run programs of their choice
-
HTTP Parsing Vulnerabilities in Check Point Firewall-1
Systems Affected Check Point Firewall-1 NG FCS Check Point Firewall-1 NG FP1 Check Point Firewall-1 NG FP2 Check Point Firewall-1 NG FP3, HF2 Check Point Firewall-1 NG with Application Intelligence R54 Check Point Firewall-1 NG with Application Intelligence R55 Overview Several versions of Check Point Firewall-1 contain a vulnerability that allows
-
Multiple Vulnerabilities in Microsoft Windows
Systems Affected Systems running Microsoft Windows Overview Microsoft Windows contains multiple vulnerabilities, the most serious of which could allow attackers to take control of your computer. Description Microsoft’s updated Home User Security Bulletin for February 2004 describes more vulnerabilities in the Microsoft Windows operating system. Microsoft is tracking these issues
-
Vulnerability in Microsoft Outlook 2002
Systems Affected Systems running Microsoft Office XP and Outlook 2002 Overview There is a vulnerability in Outlook 2002 that could allow attackers to take control of your computer. Description By taking advantage of the way Outlook interprets email links, an attacker may be able to gain control of your computer.