Skip to content
February 8, 2026
Mochiai.blog
Mochiai.blog
Random Article
  • Home
  • Lucian Constantin

Author: Lucian Constantin

Ivanti patches two actively exploited critical vulnerabilities in EPMM
Categories Cybersecurity

Ivanti patches two actively exploited critical vulnerabilities in EPMM

  • By Lucian Constantin
  • January 30, 2026

The company advises triaging logs with the ^(?!127.0.0.1:d+ .*$).*?/mifs/c/(aft|app)store/fob/.*?404 regular expression and looking for HTTP 404 error response codes as well as GET requests…

Read More
Critical bug in popular vm2 Node.js sandboxing library puts projects at risk
Categories Cybersecurity

Critical bug in popular vm2 Node.js sandboxing library puts projects at risk

  • By Lucian Constantin
  • January 28, 2026

A critical vulnerability has been patched in vm2, a widely used library for the Node.js JavaScript runtime that allows untrusted code to be executed…

Read More
Fortinet confirms new zero-day attacks against customer devices
Categories Cybersecurity

Fortinet confirms new zero-day attacks against customer devices

  • By Lucian Constantin
  • January 23, 2026

Fortinet has confirmed that a new attack campaign observed recently against customer devices is exploiting an unpatched issue to bypass authentication. The new attacks…

Read More
Trivial Telnet authentication bypass exposes devices to complete takeover
Categories Cybersecurity

Trivial Telnet authentication bypass exposes devices to complete takeover

  • By Lucian Constantin
  • January 22, 2026

Trivial exploitation “The telnetd server invokes /usr/bin/login (normally running as root) passing the value of the USER environment variable received from the client as…

Read More
Low Angle Photography of Tunnel
Categories Cybersecurity

Sophisticated VoidLink malware framework targets Linux cloud servers

  • By Lucian Constantin
  • January 15, 2026

Check Point researchers have discovered a modular malware framework likely designed by Chinese developers to harvest credentials for cloud environments. Credit: Francesco Ungaro /…

Read More
Endless rows of horror movie style walking zombies.
Categories Cybersecurity

ZombieAgent ChatGPT attack shows persistent data leak risks of AI agents

  • By Lucian Constantin
  • January 9, 2026

More Awards Blogs BrandPosts Events Podcasts Videos Enterprise Buyer’s Guides Security researchers from Radware have demonstrated techniques to exploit ChatGPT connections to third-party apps…

Read More
AI-driven technology powers automation and big data workflows, enabling analysis through neural networks and data analytics for business intelligence, predictive insights, and process optimization.
Categories Cybersecurity

Critical RCE flaw allows full takeover of n8n AI workflow platform

  • By Lucian Constantin
  • January 7, 2026

More Awards Blogs BrandPosts Events Podcasts Videos Enterprise Buyer’s Guides ‘A compromised n8n instance doesn’t just mean losing one system — it means handing…

Read More
Top 5 real-world AI security threats revealed in 2025
Categories Cybersecurity

Top 5 real-world AI security threats revealed in 2025

  • By Lucian Constantin
  • December 29, 2025

Prompt injections are a risk for all custom AI agents built by organizations that pass third-party data to an LLM and mitigating it requires…

Read More
Iranian APT Prince of Persia returns with new malware and C2 infrastructure
Categories Cybersecurity

Iranian APT Prince of Persia returns with new malware and C2 infrastructure

  • By Lucian Constantin
  • December 19, 2025

A shift to Telegram More recently, the researchers identified a new Tonnerre variant that’s advertised as v50, as well as an unknown new Foudre…

Read More
Russische APT-Gruppe greift westliche KRITIS-Betreiber an
Categories Cybersecurity

Russische APT-Gruppe greift westliche KRITIS-Betreiber an

  • By Lucian Constantin
  • December 17, 2025

„Diese taktische Anpassung ermöglicht die gleichen operativen Ergebnisse, nämlich das Sammeln von Anmeldedaten und laterale Bewegungen innerhalb der Online-Dienste und Infrastrukturen der Opfer, während…

Read More
Load More Posts

Loading...

Categories

  • AI Medical
  • AI Reasoning Model
  • Artificial intelligence
  • Best Exam for AI
  • Cybersecurity
  • Machine Learning
  • Programming & Tech
  • Technology
  • Uncategorized
  • VM

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • April 2016

Copyright © 2026
 - Powered by Magze.