<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; : Threats &amp;amp; Exploits</title>
<link>https://blog.intelligencex.org/rss/category/Threats-exploits</link>
<description>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; : Threats &amp;amp; Exploits</description>
<dc:language>en</dc:language>
<dc:rights>© 2026 IntelligenceX Blog. All rights reserved.</dc:rights>

<item>
<title>DDoS Attack : How to Protect your Business</title>
<link>https://blog.intelligencex.org/ddos-attack-how-to-protect-your-business</link>
<guid>https://blog.intelligencex.org/ddos-attack-how-to-protect-your-business</guid>
<description><![CDATA[ A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202603/image_870x580_69c3811128357.webp" length="58050" type="image/jpeg"/>
<pubDate>Wed, 25 Mar 2026 12:54:00 +0530</pubDate>
<dc:creator>Sush_P</dc:creator>
<media:keywords>Distributed Denial-of-Service (DDoS) attack</media:keywords>
</item>

<item>
<title>Supply Chain Attacks: Why Trusting Your Vendors Is Your Greatest Security Risk</title>
<link>https://blog.intelligencex.org/supply-chain-attacks-solarwinds-kaseya-cybersecurity-threat</link>
<guid>https://blog.intelligencex.org/supply-chain-attacks-solarwinds-kaseya-cybersecurity-threat</guid>
<description><![CDATA[ Master supply chain attack vectors through real-world case studies of SolarWinds (18,000 victims), Kaseya (800+ businesses), and Nobelium. Learn detection, prevention, and zero-trust strategies for securing your vendor ecosystem in 2025. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_695d8a345fee8.webp" length="26112" type="image/jpeg"/>
<pubDate>Wed, 07 Jan 2026 03:49:06 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>supply chain attacks, SolarWinds breach, Kaseya ransomware, malicious code injection, vendor security, third-party risk management, software supply chain, SBOM, zero-trust architecture, cybersecurity threats</media:keywords>
</item>

<item>
<title>CVE&#45;2025&#45;14847 (MongoBleed): The Critical MongoDB Memory Leak Affecting 87,000+ Servers</title>
<link>https://blog.intelligencex.org/cve-2025-14847-mongobleed-mongodb-memory-leak-vulnerability</link>
<guid>https://blog.intelligencex.org/cve-2025-14847-mongobleed-mongodb-memory-leak-vulnerability</guid>
<description><![CDATA[ Comprehensive analysis of CVE-2025-14847 (MongoBleed), a critical unauthenticated memory leak in MongoDB affecting 87,000+ internet-exposed servers. Explore technical mechanics, exploitation techniques, detection strategies, and search dorks for identifying vulnerable instances. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_6952bb5ee9b04.webp" length="32292" type="image/jpeg"/>
<pubDate>Mon, 29 Dec 2025 23:03:34 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>CVE-2025-14847, MongoBleed, MongoDB vulnerability, zlib vulnerability, memory leak, unauthenticated disclosure, heap memory leak, MongoDB security, database vulnerability, CVSS 8.7, information disclosure</media:keywords>
</item>

<item>
<title>CVE&#45;2025&#45;68613: Critical RCE in n8n Workflow Automation Platform</title>
<link>https://blog.intelligencex.org/cve-2025-68613-n8n-critical-rce-vulnerability</link>
<guid>https://blog.intelligencex.org/cve-2025-68613-n8n-critical-rce-vulnerability</guid>
<description><![CDATA[ A critical remote code execution vulnerability in n8n workflow automation (CVSS 9.9) allows authenticated attackers to execute arbitrary code, potentially compromising over 103,000 exposed instances worldwide. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_694b10742cc47.webp" length="28234" type="image/jpeg"/>
<pubDate>Wed, 24 Dec 2025 03:28:39 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>CVE-2025-68613, n8n vulnerability, remote code execution, RCE, workflow automation security, expression injection, CVSS 9.9, security vulnerability, patch management, n8n security</media:keywords>
</item>

<item>
<title>After React2Shell: New DoS &amp;amp; Source Code Leaks Hit React Server Components</title>
<link>https://blog.intelligencex.org/react-cve-2025-55184-67779-55183-dos-source-code-exposure</link>
<guid>https://blog.intelligencex.org/react-cve-2025-55184-67779-55183-dos-source-code-exposure</guid>
<description><![CDATA[ Just days after React2Shell (CVE-2025-55182), three new vulnerabilities emerged in React Server Components: CVE-2025-55184 and CVE-2025-67779 (CVSS 7.5) enable denial-of-service attacks via infinite loops, while CVE-2025-55183 (CVSS 5.3) leaks server-side source code. The initial patches were incomplete organizations must upgrade again to versions 19.0.3, 19.1.4, or 19.2.3. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_6943184049deb.webp" length="31212" type="image/jpeg"/>
<pubDate>Thu, 18 Dec 2025 02:24:41 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>CVE-2025-55184, CVE-2025-67779, CVE-2025-55183, React denial of service, React source code exposure, React Server Components, incomplete patch, Next.js vulnerability, React 19 security, RSC vulnerabilities</media:keywords>
</item>

<item>
<title>Exposed IAM Credentials Drive Huge AWS Crypto Mining Operation</title>
<link>https://blog.intelligencex.org/exposed-iam-credentials-aws-crypto-mining</link>
<guid>https://blog.intelligencex.org/exposed-iam-credentials-aws-crypto-mining</guid>
<description><![CDATA[ A large-scale cryptomining campaign is abusing exposed AWS IAM credentials to deploy persistent mining infrastructure. The operation leverages stealthy techniques to evade detection, inflate cloud costs, and maintain long-term access to compromised environments. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_69424d4ae0b23.webp" length="96492" type="image/jpeg"/>
<pubDate>Wed, 17 Dec 2025 11:58:01 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>VolkLocker Ransomware Broken: Hard&#45;Coded Master Key Lets Victims Decrypt Files for Free</title>
<link>https://blog.intelligencex.org/volklocker-ransomware-hard-coded-master-key-exposed</link>
<guid>https://blog.intelligencex.org/volklocker-ransomware-hard-coded-master-key-exposed</guid>
<description><![CDATA[ Security researchers have uncovered a critical flaw in VolkLocker ransomware, revealing a hard-coded master encryption key. This weakness allows victims to decrypt encrypted files without paying the ransom, highlighting serious implementation failures in modern ransomware campaigns. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_6941294b5a16e.webp" length="25938" type="image/jpeg"/>
<pubDate>Tue, 16 Dec 2025 15:07:03 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Fortinet, Ivanti, and SAP Issue Urgent Patches for High&#45;Risk Authentication and Code Execution Flaws</title>
<link>https://blog.intelligencex.org/fortinet-ivanti-sap-high-risk-patches</link>
<guid>https://blog.intelligencex.org/fortinet-ivanti-sap-high-risk-patches</guid>
<description><![CDATA[ Fortinet, Ivanti, and SAP have released urgent patches to fix serious vulnerabilities that could let attackers bypass authentication or execute code on impacted systems. These flaws are being closely watched by security teams because they affect widely deployed enterprise products. Organizations are advised to apply the updates as soon as possible, review logs for unusual activity, and tighten exposed services to reduce the chances of exploitation in active environments. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_693a9d4a13621.webp" length="24594" type="image/jpeg"/>
<pubDate>Thu, 11 Dec 2025 16:03:36 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Google Confirms In&#45;the&#45;Wild Attacks on Chrome Via a High&#45;Impact, Undisclosed Flaw</title>
<link>https://blog.intelligencex.org/chrome-security-update-high-severity-bug</link>
<guid>https://blog.intelligencex.org/chrome-security-update-high-severity-bug</guid>
<description><![CDATA[ Google has released new security updates for Chrome after confirming that a high-severity vulnerability, tracked as issue 466192044, is being actively exploited. The company has not yet shared technical details about the flaw to prevent further misuse, but urges all users to update Chrome immediately. The latest patches also include fixes for multiple zero-day vulnerabilities disclosed earlier this year, along with two medium-severity issues affecting the Password Manager and Toolbar components. Users on Windows, macOS, Linux, and other Chromium-based browsers like Edge, Brave, Opera, and Vivaldi are advised to install the updates as soon as they become available. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_693a7dd7d1052.webp" length="32580" type="image/jpeg"/>
<pubDate>Thu, 11 Dec 2025 13:48:00 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Active Attacks Exploit Gladinet&amp;apos;s Hard&#45;Coded Keys for Unauthorized Access and Code Execution</title>
<link>https://blog.intelligencex.org/active-gladinet-key-exploit-attack</link>
<guid>https://blog.intelligencex.org/active-gladinet-key-exploit-attack</guid>
<description><![CDATA[ Recent attacks are taking advantage of hard-coded encryption keys in Gladinet products, allowing attackers to break in without credentials and run commands on vulnerable systems. This flaw gives threat actors a direct path to bypass authentication, steal data, and take full control of affected servers. Security researchers are urging organizations using Gladinet or its derivatives to update immediately, review logs for unusual activity, and apply compensating controls until patches are fully deployed. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_693a69731502c.webp" length="41634" type="image/jpeg"/>
<pubDate>Thu, 11 Dec 2025 12:54:31 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>CVE&#45;2025&#45;66516: Critical XXE in Apache Tika (CVSS 10.0) Enables RCE via Malicious PDFs</title>
<link>https://blog.intelligencex.org/cve-2025-66516-apache-tika-xxe-vulnerability-pdf-rce</link>
<guid>https://blog.intelligencex.org/cve-2025-66516-apache-tika-xxe-vulnerability-pdf-rce</guid>
<description><![CDATA[ CVE-2025-66516 is a maximum-severity (CVSS 10.0) XML External Entity (XXE) vulnerability in Apache Tika that allows unauthenticated attackers to achieve file disclosure, SSRF, and remote code execution by embedding malicious XFA content inside PDF files, affecting millions of document processing systems worldwide. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_69372b59bef77.webp" length="26428" type="image/jpeg"/>
<pubDate>Tue, 09 Dec 2025 01:18:41 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>CVE-2025-66516, Apache Tika XXE, XML External Entity, CVSS 10.0, Tika vulnerability, PDF exploit, XFA attack, Apache Tika security, file disclosure, SSRF vulnerability, tika-core exploit</media:keywords>
</item>

<item>
<title>CVE&#45;2025&#45;55182 (React2Shell): The CVSS 10.0 RCE That Broke React Server Components</title>
<link>https://blog.intelligencex.org/cve-2025-55182-react2shell-rce-exploit-poc</link>
<guid>https://blog.intelligencex.org/cve-2025-55182-react2shell-rce-exploit-poc</guid>
<description><![CDATA[ CVE-2025-55182 is a critical maximum-severity (CVSS 10.0) unauthenticated remote code execution vulnerability in React Server Components affecting React 19.x and Next.js 15-16.x, with working POCs published within 24 hours, it&#039;s now actively exploited by China-nexus APT groups with 39% of cloud environments exposed. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_69333d939226a.webp" length="28080" type="image/jpeg"/>
<pubDate>Sat, 06 Dec 2025 01:02:26 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>CVE-2025-55182, React2Shell, React RCE vulnerability, Next.js CVE-2025-66478, React Server Components exploit, CVSS 10.0, unauthenticated RCE, React vulnerability POC, unsafe deserialization, Flight protocol exploit</media:keywords>
</item>

<item>
<title>Why People Overshare&#45;and How Hackers Use It</title>
<link>https://blog.intelligencex.org/why-people-overshare-and-how-hackers-use-it</link>
<guid>https://blog.intelligencex.org/why-people-overshare-and-how-hackers-use-it</guid>
<description><![CDATA[ Discover why people overshare on social media and how hackers exploit it. Learn the psychology behind oversharing, real-world breach examples, and actionable protection strategies. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6925a340a0e6d.webp" length="42330" type="image/jpeg"/>
<pubDate>Wed, 26 Nov 2025 17:10:36 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Never Open These Emails&#45;Ever: The Most Dangerous Messages in Your Inbox</title>
<link>https://blog.intelligencex.org/never-open-these-emails-ever-the-most-dangerous-messages-in-your-inbox</link>
<guid>https://blog.intelligencex.org/never-open-these-emails-ever-the-most-dangerous-messages-in-your-inbox</guid>
<description><![CDATA[ Stay alert against dangerous emails! Discover the red flags of phishing, scams, and malware messages-and learn why you should never open these emails, ever. Safeguard your inbox with actionable Cyber Security tips today. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_692546d65efa8.webp" length="40622" type="image/jpeg"/>
<pubDate>Tue, 25 Nov 2025 12:50:45 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>The New Cyber Crime Trend No One is Talking About</title>
<link>https://blog.intelligencex.org/the-new-cyber-crime-trend-no-one-is-talking-about-edge-devices-as-attack-infrastructure</link>
<guid>https://blog.intelligencex.org/the-new-cyber-crime-trend-no-one-is-talking-about-edge-devices-as-attack-infrastructure</guid>
<description><![CDATA[ Discover how attackers weaponize smart devices as stealth command-and-control infrastructure. Learn about ORB&#039;s, detection strategies, and how to protect your network from this hidden threat. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6923f758dee4d.webp" length="45318" type="image/jpeg"/>
<pubDate>Mon, 24 Nov 2025 12:05:03 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>How Hackers Guess Your Password Just by Looking at You</title>
<link>https://blog.intelligencex.org/how-hackers-guess-your-password-just-by-looking-at-you</link>
<guid>https://blog.intelligencex.org/how-hackers-guess-your-password-just-by-looking-at-you</guid>
<description><![CDATA[ Discover how shoulder surfing attacks compromise passwords in public spaces. Learn about behavioral biometrics, passwordless authentication, and practical defenses to protect your digital identity from physical observation threats. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_692164905092f.webp" length="46752" type="image/jpeg"/>
<pubDate>Sat, 22 Nov 2025 13:03:41 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Safe Online Shopping: How to Protect Your Card Details</title>
<link>https://blog.intelligencex.org/safe-online-shopping-how-to-protect-your-card-details</link>
<guid>https://blog.intelligencex.org/safe-online-shopping-how-to-protect-your-card-details</guid>
<description><![CDATA[ Protect your online shopping! Learn essential tips to secure your credit card details from rising cyber threats like phishing &amp; dark web sales. Discover secure websites, payment methods, multi-factor authentication, and how to spot scams to keep your finances safe. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_691c1a638795d.webp" length="42348" type="image/jpeg"/>
<pubDate>Tue, 18 Nov 2025 12:55:21 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Signs Your Online Bank Account Is Under Attack&#45;And What to Do</title>
<link>https://blog.intelligencex.org/signs-your-online-bank-account-is-under-attack-and-what-to-do</link>
<guid>https://blog.intelligencex.org/signs-your-online-bank-account-is-under-attack-and-what-to-do</guid>
<description><![CDATA[ Optimized for search engine display with primary keywords and compelling messaging that encourages clicks ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_691adaffbdb06.webp" length="31822" type="image/jpeg"/>
<pubDate>Mon, 17 Nov 2025 14:45:28 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Why Your Company Is a Prime Target for Hackers: Understanding the Real Threat</title>
<link>https://blog.intelligencex.org/why-your-company-is-a-prime-target-for-hackers-understanding-the-real-threat</link>
<guid>https://blog.intelligencex.org/why-your-company-is-a-prime-target-for-hackers-understanding-the-real-threat</guid>
<description><![CDATA[ Learn why companies are prime targets for hackers. Understand data breach costs, ransomware threats, and build a resilient security strategy to protect your business. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6911a79dd9795.webp" length="65858" type="image/jpeg"/>
<pubDate>Mon, 10 Nov 2025 15:34:20 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>EXPOSED: How Chinese State Hackers Infiltrated European Governments Using a Sneaky Windows Trick</title>
<link>https://blog.intelligencex.org/exposed-how-chinese-state-hackers-infiltrated-european-governments-using-a-sneaky-windows-trick-146</link>
<guid>https://blog.intelligencex.org/exposed-how-chinese-state-hackers-infiltrated-european-governments-using-a-sneaky-windows-trick-146</guid>
<description><![CDATA[ Chinese state hackers breached European governments via a Windows shortcut exploit. Learn how this attack worked-and if your emails could be the next target. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_69087ea7883d0.webp" length="22694" type="image/jpeg"/>
<pubDate>Mon, 03 Nov 2025 15:49:02 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>EXPOSED: How Chinese State Hackers Infiltrated European Governments Using a Sneaky Windows Trick</title>
<link>https://blog.intelligencex.org/exposed-how-chinese-state-hackers-infiltrated-european-governments-using-a-sneaky-windows-trick</link>
<guid>https://blog.intelligencex.org/exposed-how-chinese-state-hackers-infiltrated-european-governments-using-a-sneaky-windows-trick</guid>
<description><![CDATA[ Sophisticated attack chain showing how Chinese hackers use spear-phishing emails with malicious Windows shortcuts to deploy PlugX remote access trojan, giving attackers complete control over European diplomatic networks and enabling massive data theft. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6912e6c864c35.webp" length="52362" type="image/jpeg"/>
<pubDate>Mon, 03 Nov 2025 13:27:11 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>The Silent Intruder: How Malware Lives Among Us</title>
<link>https://blog.intelligencex.org/the-silent-intruder-how-malware-lives-among-us</link>
<guid>https://blog.intelligencex.org/the-silent-intruder-how-malware-lives-among-us</guid>
<description><![CDATA[ Discover how stealthy malware silently invades and persists in systems, evading detection and causing long-term harm. Learn the latest techniques attackers use and how to defend against these hidden threats. Stay informed and protect your digital space today. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_69085de1f38da.webp" length="67978" type="image/jpeg"/>
<pubDate>Mon, 03 Nov 2025 13:16:57 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Spoofing Attacks Explained &#45; Types, Risks, and How to Stop Them</title>
<link>https://blog.intelligencex.org/spoofing-attacks-explained-types-risks-and-how-to-stop-them</link>
<guid>https://blog.intelligencex.org/spoofing-attacks-explained-types-risks-and-how-to-stop-them</guid>
<description><![CDATA[ Spoofing attacks involve attackers impersonating trusted sources across email, phone, DNS, and other systems to steal data or commit fraud. Defense requires a multi-layered approach combining email authentication protocols (DMARC, DKIM, SPF), AI-based threat detection, user training, and solutions from vendors like Proofpoint and Microsoft. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6926e6d94a7b2.webp" length="30946" type="image/jpeg"/>
<pubDate>Fri, 31 Oct 2025 13:24:02 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>AI&#45;Driven Malware: The Evolution of Cyber Threats in the Age of Artificial Intelligence</title>
<link>https://blog.intelligencex.org/ai-driven-malware-the-evolution-of-cyber-threats-in-the-age-of-artificial-intelligence</link>
<guid>https://blog.intelligencex.org/ai-driven-malware-the-evolution-of-cyber-threats-in-the-age-of-artificial-intelligence</guid>
<description><![CDATA[ Artificial intelligence  malware has transformed cyber threats from static, signature-based attacks to adaptive, self-evolving adversaries that take real-time decisions and mutate their code for evading detection. AI products such as GhostWriter and &quot;Skynet&quot; facilitate hyper-personalized phishing and prompt-injection evasion, reducing the bar to sophisticated cybercrime. While defenders use AI for threat analysis and zero-trust architectures, attackers retaliate with polymorphic malware and self-governing reconnaissance, fueling an immediate AI arms race for cybersecurity. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6926ed3b66035.webp" length="60900" type="image/jpeg"/>
<pubDate>Wed, 22 Oct 2025 12:44:10 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Ransomware and state&#45;sponsored APT are the most dangerous cyber attacks in the world!</title>
<link>https://blog.intelligencex.org/ransomware-APT</link>
<guid>https://blog.intelligencex.org/ransomware-APT</guid>
<description><![CDATA[ Ransomware attacks in 2025 often use AI to launch highly targeted, adaptive attacks that encrypt data and demand large ransoms. State-sponsored APTs focus on stealthy, long-term cyber espionage to gain strategic advantages. Both pose severe risks and require advanced AI-driven defenses and continuous vigilance to protect organizations from costly breaches and disruptions.​ ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68f0953ab7023.webp" length="55186" type="image/jpeg"/>
<pubDate>Wed, 22 Oct 2025 12:44:10 +0530</pubDate>
<dc:creator>Shivi_k</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Critical Wing FTP Server Vulnerability (CVE&#45;2025&#45;47812) Actively Being Exploited in the Wild</title>
<link>https://blog.intelligencex.org/critical-wing-ftp-server-vulnerability-cve-2025-47812-exploited</link>
<guid>https://blog.intelligencex.org/critical-wing-ftp-server-vulnerability-cve-2025-47812-exploited</guid>
<description><![CDATA[ CVE-2025-47812 is a maximum-severity remote code execution vulnerability in Wing FTP Server versions before 7.4.4, allowing unauthenticated attackers to execute arbitrary Lua code via null byte injection—resulting in full system compromise. Actively exploited since early July, this critical flaw underscores the urgent need for patching and monitoring. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e6463d0dbb5.webp" length="10354" type="image/jpeg"/>
<pubDate>Wed, 27 Aug 2025 17:50:47 +0530</pubDate>
<dc:creator>Root</dc:creator>
<media:keywords>CVE-2025-47812, Wing FTP Server, remote code execution, RCE, null byte injection, Lua injection, active exploitation, patch now</media:keywords>
</item>

<item>
<title>WinRAR Releases Emergency Patch for CVE&#45;2025&#45;8088 Zero&#45;Day Exploit</title>
<link>https://blog.intelligencex.org/cve-2025-8088-winrar-zero-day-exploit</link>
<guid>https://blog.intelligencex.org/cve-2025-8088-winrar-zero-day-exploit</guid>
<description><![CDATA[ WinRAR has patched a critical zero-day vulnerability (CVE-2025-8088) in its Windows versions, actively exploited in spear-phishing attacks. The flaw allowed attackers to drop hidden payloads into auto-run locations, granting persistence and remote code execution.CVE-2025-8088, discovered by ESET researchers, leveraged path traversal through alternate data streams (ADSes). From mid-July 2025, threat actors RomCom and Paper Werewolf used the flaw in targeted campaigns against defense, finance, and manufacturing sectors. The vulnerability was patched in WinRAR 7.13 on July 30, 2025. As WinRAR does not auto-update, all users must manually install the latest version to stay secure. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e642bb86d96.webp" length="53282" type="image/jpeg"/>
<pubDate>Wed, 27 Aug 2025 17:24:15 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>CVE-2025-8088, WinRAR zero-day exploit. path traversal vulnerability, alternate data streams (ADS), RomCom WinRAR exploit, Paper Werewolf cyberattack, WinRAR 7.13 update, spear-phishing malware campaigns</media:keywords>
</item>

</channel>
</rss>