Explore >> Select a destination


You are here

jericho.blog
| | www.threatmate.com
7.0 parsecs away

Travel
| | The DownloadCVE-2025-4664 is a serious zero-day vulnerability in Google Chrome that has been actively exploited in the wild, allowing attackers to hijack user devices through crafted web content. For business owners, MSPs, and IT operators, this poses an immediate and widespread risk-Chrome is one of the most widely used browsers in enterprise environments. A successful exploit could give an attacker access to session tokens, browser-stored credentials, or even control over a device-jeopardizing
| | malgregator.com
5.3 parsecs away

Travel
| | Ubiquiti network devices are being remotely exploited, via port 10001 discovery service. Results in loss of device management, also being used as a weak UDP DDoS amplification attack: 56 bytes in, 206 bytes out.
| | thehackernews.com
5.6 parsecs away

Travel
| | A critical vulnerability (CVE-2024-3400) in Palo Alto Networks PAN-OS is being actively exploited by threat actors.
| | www.darktrace.com
21.1 parsecs away

Travel
| Discover the cybersecurity risks and solutions for the mining industry. Learn how mining companies can protect against cyber threats with advanced security measures.