The walkthrough covers thirteen distinct attack phases: AD CS template reconnaissance, LDAP enumeration, Kerberos weakness discovery, credential extraction, SAMR account manipulation, Resource-Based C…
cyberintel.kalymoon.com · 22266 articles · updated every 4 hours · grows forever
The walkthrough covers thirteen distinct attack phases: AD CS template reconnaissance, LDAP enumeration, Kerberos weakness discovery, credential extraction, SAMR account manipulation, Resource-Based C…
Over 40,000 Servers Compromised in Ongoing cPanel Exploitation Attackers are exploiting CVE-2026-41940, a critical cPanel and WHM authentication bypass flaw that can give unauthenticated attackers adm…
Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise Microsoft detailed a large adversary-in-the-middle phishing campaign that targeted more than 35,000 us…
Palo Alto Networks warns of firewall RCE zero-day exploited in attacks Palo Alto Networks warned that attackers are exploiting CVE-2026-0300, a critical PAN-OS buffer overflow vulnerability affecting …
Claude AI Guided Hackers Toward OT Assets During Water Utility Intrusion Dragos reported that attackers used Claude and GPT models during an intrusion into a municipal water and drainage utility in Mo…
Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks Ivanti released May security updates for Endpoint Manager Mobile that fix five vulnerabilities, including CVE-2026-6973, a high-severity flaw…
As AI-generated CSAM blurs the line between real and fabricated evidence, investigators need the right tools, legal awareness and forensic expertise to identify victims, prioritise leads and pursue ju…
Read the latest DFIR news – WAInsight WhatsApp forensics, Volatility3 and Hindsight updates, cloud forensics challenges, and more.
Si and Desi discuss a range of digital forensics topics, from writing forensic reports that juries can actually understand, to whether AI is coming for “button pusher” DFIR jobs.
Discover what’s new on Forensic Focus – explore the emerging threat of AI-generated CSAM, preview what’s to come at Techno East 2026, register free for Forensics Europe Expo 2026, and more.
Traccar GPS Tracking System 6.11.1 - Cross-Site WebSocket Hijacking (CSWSH)
Windows 11 24H2 - Local Privilege Escalation
MindsDB 25.9.1.1 - Path Traversal
Linksys E1200 2.0.04 - Authenticated Stack Buffer Overflow (RCE)
Linux nf_tables 6.19.3 - Local Privilege Escalation
Linux Kernel proc_readdir_de() 6.18-rc5 - Local Privilege Escalation
ThingsBoard IoT Platform 4.2.0 - Server-Side Request Forgery (SSRF)