#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

20 C
Dubai
Wednesday, January 28, 2026
HomeTopics 5Zero Day

Zero Day

spot_imgspot_imgspot_imgspot_img

Dutch NCSC Confirms Advanced Zero-Day Attacks on Citrix NetScaler: Multiple Critical Organizations Breached

On 11 August 2025, the Dutch National Cyber Security Centre (NCSC) confirmed that multiple critical organizations in the Netherlands have been successfully compromised via...

Apple Urges Immediate Update as July 2025 Security Patches Address Multiple Zero‑Days

Apple has rolled out a major security update on 29 July 2025, patching over two dozen vulnerabilities-including zero‑day flaws actively exploited in Chrome and privilege escalation...

Chrome Under Active Exploit: Google Patches High-Risk Zero-Day in V8 Engine (CVE-2025-5419)

On 2 June 2025, Google issued an urgent Stable Channel update for Chrome Desktop, patching three security flaws — including CVE-2025-5419, a high-severity vulnerability...

Unpatched Zero-Day in TI WooCommerce Wishlist Plugin Exposes Over 100K Sites to RCE Risk

A critical unauthenticated file upload flaw in the TI WooCommerce Wishlist plugin, tracked as CVE-2025-47577, remains unpatched leaving over 100,000 WordPress e-commerce sites exposed...

Marbled Dust Exploits Zero-Day in Output Messenger to Spy on Kurdish Targets: Inside a Sophisticated Regional Espionage Campaign

In April 2024, a covert cyber-espionage campaign shook the Middle Eastern cybersecurity landscape. Microsoft Threat Intelligence uncovered a zero-day exploit in the widely used...

Exploiting the Kernel: How Play Ransomware Leveraged a Windows Zero-Day for Privilege Escalation

In early April 2025, cybersecurity researchers uncovered a sophisticated attack by the Play ransomware group, also known as Balloonfly. This operation exploited a previously...

Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis

In the ever-evolving landscape of cybersecurity, zero-day vulnerabilities remain a formidable challenge. These are security flaws unknown to the software vendor, exploited by attackers...

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Must read

spot_imgspot_imgspot_imgspot_img