In The News

Blog Archive Category

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines

The Exploit articles categorized as In The News

  • BYOVD Attacks and EDR Evasion: Why Your Endpoint Security May Not Be Enough

    BYOVD Attacks and EDR Evasion: Why Your Endpoint Security May Not Be Enough

    By Brian Tant With Reynolds Ransomware in the wild, Brian Tant dives into BYOVD attacks, how they evade enterprise defense like EDRs, and what your organization can do. March 18, 2026
  • Reynolds Ransomware BYOVD Eludes EDR Tools

    Reynolds Ransomware BYOVD Eludes EDR Tools

    By Nathan Anderson Reynolds poses a new type of threat by including a Bring Your Own Vulnerable Driver (BYOVD) in the ransomware bundle, making it harder for EDR tools to catch. February 20, 2026
  • BeyondTrust RCE Vulnerability Exploited: Critical 9.9 CVSS Flaw Under Active Attack

    BeyondTrust RCE Vulnerability Exploited: Critical 9.9 CVSS Flaw Under Active Attack

    By Ryan Chaplin While BeyondTrust patched cloud-hosted Remote Support customers earlier this month, on-premises deployments of BeyondTrust must manually patch to remediate. February 17, 2026
  • CVE-2025-59886 Eaton Exploit Code Published

    CVE-2025-59886 Eaton Exploit Code Published

    By Jason Taylor With exploit code available for the vulnerabilities in Eaton’s xComfort Ethernet Communication Interface, Jason Taylor recommends replacing or isolating. February 5, 2026
  • Publicly Accessible Database Discovered Hosting 149 Million Credentials

    Publicly Accessible Database Discovered Hosting 149 Million Credentials

    By Andrew Trexler Andrew Trexler looks at a recently discovered public database of stolen usernames and passwords and what you can do now to protect your access and information. February 2, 2026
  • The Growing Threat: Attackers Using GitHub Repositories as Malware Staging Mechanisms

    The Growing Threat: Attackers Using GitHub Repositories as Malware Staging Mechanisms

    By Brian Tant Recent attacks, including GitVenom and Lumma Stealer, underscore the threat of Attackers using GitHub repositories as malware staging mechanisms. January 21, 2026