Powered by Jutsu
Blog
About Us
Contact Us
Privacy Policy
Terms & Conditions
All Right Reserved by Jutsu Inc. | 2024
Author at AgentSOC
The threat actor referred to as Silver Fox is now actively targeting India, using phishing emails themed around…
A high-severity MongoDB vulnerability has been identified that enables unauthenticated clients to read uninitialized data from the server…
In December 2024, the popular Ultralytics AI library was compromised and used to deploy malicious code that hijacked…
Cybersecurity researchers have outlined a “sustained and targeted” spear-phishing operation that weaponized more than two dozen npm packages…
A newly disclosed MongoDB security bug is now being actively weaponized, with more than 87,000 internet-facing instances appearing…
From a SOC lens, last week’s activity in 2025 wasn’t dominated by a single headline breach, but by…
From a SOC vantage point, the line between routine technology use and hostile activity is getting thinner. Adversaries…
A critical vulnerability has been identified in LangChain Core that an attacker could abuse to exfiltrate sensitive secrets…
A China-based advanced persistent threat (APT) group has been tied to a focused cyber-espionage operation in which the…
Trust Wallet is urging users to immediately update its Google Chrome extension to the latest release after identifying…
A high-impact vulnerability has been identified in MongoDB that enables unauthenticated clients to read uninitialized heap memory from…
Security analysts have identified a new variant of the macOS information-stealing malware MacSync, delivered via a digitally signed…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a vulnerability affecting Digiever DS-2105 Pro network video recorders…
Fortinet on Wednesday said it has observed “recent abuse” of a five-year-old FortiOS SSL VPN vulnerability being exploited…
Encrypted vault backups stolen during the 2022 LastPass incident are still being successfully attacked, with threat actors leveraging…
From a SOC perspective, the line between routine technology use and active abuse keeps narrowing. Intrusions increasingly look…