Preview image for a blog post

Rapid Exploitation: Hackers Leverage Critical Langflow Vulnerability in Under 20 Hours

Sysdig reports critical Langflow bug exploited by threat actors within 20 hours, highlighting urgent patch management and AI supply chain risks.
Preview image for a blog post

React2Shell Exploitation: New Advanced Toolkit Targets High-Value Networks

Threat actors are deploying a sophisticated, unfortunately named toolkit to scan and exploit React2Shell vulnerabilities in critical infrastructure.
Preview image for a blog post

Real-Time Vishing Kits: The New Frontier in MFA Bypass and Threat Actor Control

Voice phishing kits empower threat actors with real-time control, bypassing MFA through sophisticated call orchestration and session hijacking.