The Exploit articles categorized as In The News
-

BYOVD Attacks and EDR Evasion: Why Your Endpoint Security May Not Be Enough
By Brian Tant With Reynolds Ransomware in the wild, Brian Tant dives into BYOVD attacks, how they evade enterprise defense like EDRs, and what your organization can do. March 18, 2026 -

Reynolds Ransomware BYOVD Eludes EDR Tools
By Nathan Anderson Reynolds poses a new type of threat by including a Bring Your Own Vulnerable Driver (BYOVD) in the ransomware bundle, making it harder for EDR tools to catch. February 20, 2026 -

BeyondTrust RCE Vulnerability Exploited: Critical 9.9 CVSS Flaw Under Active Attack
By Ryan Chaplin While BeyondTrust patched cloud-hosted Remote Support customers earlier this month, on-premises deployments of BeyondTrust must manually patch to remediate. February 17, 2026 -

CVE-2025-59886 Eaton Exploit Code Published
By Jason Taylor With exploit code available for the vulnerabilities in Eaton’s xComfort Ethernet Communication Interface, Jason Taylor recommends replacing or isolating. February 5, 2026 -

Publicly Accessible Database Discovered Hosting 149 Million Credentials
By Andrew Trexler Andrew Trexler looks at a recently discovered public database of stolen usernames and passwords and what you can do now to protect your access and information. February 2, 2026 -

The Growing Threat: Attackers Using GitHub Repositories as Malware Staging Mechanisms
By Brian Tant Recent attacks, including GitVenom and Lumma Stealer, underscore the threat of Attackers using GitHub repositories as malware staging mechanisms. January 21, 2026