Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access
Ravie LakshmananMay 15, 2026Botnet / Threat Intelligence The Russian state-sponsored hacking group…
On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email
Ravie LakshmananMay 15, 2026Microsoft / Vulnerability Microsoft has disclosed a new security…
The EOL Blind Spot in Your CVE Feed: What SCA Tools Miss
Written by Isaac Wuest, Principal Product Manager at HeroDevs. When security teams…
Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access
Ravie LakshmananMay 14, 2026Vulnerability / Network Security Cisco has released updates to…
PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure
Ravie LakshmananMay 14, 2026Vulnerability / API Security Threat actors have been observed…
Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation
Ravie LakshmananMay 13, 2026Cyber Espionage / Malware A threat actor with affiliations…
Microsoft’s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday
Ravie LakshmananMay 13, 2026Vulnerability / Artificial Intelligence Microsoft has unveiled a new…
The Case for Autonomous Validation
By Sila Ozeren Hacioglu, Security Research Engineer at Picus Security. In April…
Why Your Automated Pentesting Tool Just Hit a Wall
By Sila Ozeren Hacioglu, Security Research Engineer at Picus Security. It’s a…


