Critical unauthenticated RCE vulnerability enables complete device takeover in enterprise networks

Weekly insights on threats, vulnerabilities, and security best practices.

BeyondTrust Remote Support appliances face active exploitation of critical pre-authentication RCE vulnerability. Attackers achieve full system compromise without credentials.

CRESCENTHARVEST campaign deploys custom RAT malware against Iran protest supporters, demonstrating advanced surveillance TTPs for long-term information theft and monitoring operations.

Dell RecoverPoint VM vulnerability CVE-2026-22769 (CVSS 10.0) exploited by Chinese APT UNC6201 since mid-2024 through hard-coded credentials, enabling complete infrastructure compromise.