- God Mode On: how we attacked a vehicle’s head unit modemby Alexander Kozlov, Sergey Anufrienko, Kaspersky ICS CERT on December 16, 2025 at 10:00 am
Kaspersky researchers describe how they gained access to a vehicle’s head unit by exploiting a single vulnerability in its modem.
- It didn’t take long: CVE-2025-55182 is now under active exploitationby Kaspersky, Yaroslav Shmelev on December 11, 2025 at 7:30 am
Threat actors are now exploiting CVE-2025-55182, and attacks are poised to grow. Here’s what you need to know about the vulnerability, how our honeypots are being targeted, what malware is being deployed, and how to protect your systems.
- Exploits and vulnerabilities in Q3 2025by Alexander Kolesnikov on December 3, 2025 at 10:00 am
This report provides statistical data on vulnerabilities published and exploits we researched during the third quarter of 2025. It also includes summary data on the use of C2 frameworks.
- Old tech, new vulnerabilities: NTLM abuse, ongoing exploitation in 2025by Leandro Cuozzo on November 26, 2025 at 10:00 am
This article covers NTLM relay, credential forwarding, and other NTLM-related vulnerabilities and cyberattacks discovered in 2025.
- Exploits and vulnerabilities in Q2 2025by Alexander Kolesnikov on August 27, 2025 at 10:00 am
This report provides statistical data on published vulnerabilities and exploits we researched in Q2 2025. It also includes summary data on the use of C2 frameworks.
- Driver of destruction: How a legitimate driver is being used to take down AV processesby Cristian Souza, Ashley Muñoz, Eduardo Ovalle, Francesco Figurelli, Anderson Leite on August 6, 2025 at 10:00 am
In an incident response case, Kaspersky experts discovered new malware that terminates AV processes by abusing the legitimate ThrottleStop driver. Kaspersky solutions successfully counter and detect this threat.
- ToolShell: a story of five vulnerabilities in Microsoft SharePointby Boris Larin, Georgy Kucherin, Ilya Savelyev on July 25, 2025 at 7:00 am
Explaining the ToolShell vulnerabilities in SharePoint: how the POST request exploit works, why initial patches can be easily bypassed, and how to stay protected.
- Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721by Anderson Leite on June 6, 2025 at 10:00 am
Kaspersky GReAT experts describe the new features of a Mirai variant: the latest botnet infections target TBK DVR devices with CVE-2024-3721.
- Exploits and vulnerabilities in Q1 2025by Alexander Kolesnikov on May 30, 2025 at 12:00 pm
This report contains statistics on vulnerabilities and published exploits, along with an analysis of the most noteworthy vulnerabilities we observed in the first quarter of 2025.
- Operation SyncHole: Lazarus APT goes back to the wellby Sojun Ryu, Vasily Berdnikov on April 24, 2025 at 5:00 am
Kaspersky GReAT experts uncovered a new campaign by Lazarus APT that exploits vulnerabilities in South Korean software products and uses a watering hole approach.
Vulnerabilities and Exploits
We are an ethical website cyber security team and we perform security assessments to protect our clients.

















