CyberLeveling Logo

We're leveling your security

Through a cybersecurity intelligence and learning platform delivering in-depth coverage of data breaches, cyberattacks, vulnerabilities, and offensive/defensive security insights.

Latest Updates

Understanding the Recent Dell Unisphere for PowerMax 10.2 Vulnerabilities

Understanding the Recent Dell Unisphere for PowerMax 10.2 Vulnerabilities

Feb 20, 2026
Vulnerability / Storage Management

An analysis of three high-severity vulnerabilities in Dell Unisphere for PowerMax 10.2, exploring risks from missing authorization, arbitrary file overwrite, and deletion.

When Trusted SaaS Platforms Become the Delivery Vehicle for Spam

When Trusted SaaS Platforms Become the Delivery Vehicle for Spam

Feb 20, 2026
Insights / SaaS Security

An analysis of a campaign that abused Atlassian Jira Cloud to distribute targeted spam, highlighting the risks of implicit trust in SaaS domains.

Washington Hotel Ransomware Attack: What Happened and What It Teaches Us

Washington Hotel Ransomware Attack: What Happened and What It Teaches Us

Feb 18, 2026
Data Breach / Ransomware

A structured analysis of the Washington Hotel ransomware attack, exploring how segmentation saved guest data while corporate systems were hit.

GitHub Enterprise Server Authorization Vulnerabilities (CVE-2026-0573, CVE-2026-1355, CVE-2026-1999)

GitHub Enterprise Server Authorization Vulnerabilities (CVE-2026-0573, CVE-2026-1355, CVE-2026-1999)

Feb 18, 2026
Vulnerability / Authorization

An analysis of three critical authorization vulnerabilities in GitHub Enterprise Server, exploring how authenticated logic gaps can lead to token leakage, migration tampering, and unauthorized merges.

CVE-2026-22769: Hardcoded Credential in Dell RecoverPoint for VMs (Critical)

CVE-2026-22769: Hardcoded Credential in Dell RecoverPoint for VMs (Critical)

Feb 18, 2026
Vulnerability / Data Protection

Dell has published details of CVE-2026-22769, a critical hardcoded credential vulnerability in Dell RecoverPoint for VMs, which allows for remote, unauthenticated system access.

When Malware Talks to AI: The Quiet Rise of AI as a Command-and-Control Channel

When Malware Talks to AI: The Quiet Rise of AI as a Command-and-Control Channel

Feb 18, 2026
Insights / AI Security

An exploration of how malware can use legitimate AI platforms as a covert command-and-control (C2) channel to blend into trusted enterprise traffic.

LightLLM and CVE-2026-26220: What Happened, Why It Matters, and What To Do About It

LightLLM and CVE-2026-26220: What Happened, Why It Matters, and What To Do About It

Feb 17, 2026
Vulnerability / AI Infrastructure

An analysis of CVE-2026-26220, a critical unauthenticated remote code execution (RCE) vulnerability in the LightLLM inference framework caused by unsafe pickle deserialization.

FLARE VM and REMnux: The Tools Behind Modern Malware Analysis

FLARE VM and REMnux: The Tools Behind Modern Malware Analysis

Feb 17, 2026
Guides / Malware Analysis

An overview of FLARE VM and REMnux, explaining the tools used for Windows-based reverse engineering, live system analysis, and memory forensics with Volatility 3.

What Is capa in Cybersecurity? A Practical Guide to Program Capability Analysis

What Is capa in Cybersecurity? A Practical Guide to Program Capability Analysis

Feb 16, 2026
Guides / Malware Analysis

A guide to capa, an open-source tool from Mandiant that helps analysts quickly understand the capabilities of a binary without deep reverse engineering.

User Enumeration in Web Applications

User Enumeration in Web Applications

Feb 16, 2026
Insights / Web Security

A practical look at user enumeration from both attacker and defender perspectives, explaining how it works and how to defend against it.

When a Website Looks Fine… Until It Doesn’t: A Real-World Case of an Injected iFrame

When a Website Looks Fine… Until It Doesn’t: A Real-World Case of an Injected iFrame

Feb 16, 2026
Insights / Web Security

A real-world case study of a malicious iFrame injection, explaining how they work, how they're used to redirect users or steal credentials, and practical recommendations for developers.

What Happened in the Figure Technology Data Breach

What Happened in the Figure Technology Data Breach

Feb 15, 2026
Data Breach / Fintech

An analysis of the Figure Technology data breach, where a social engineering attack led to the compromise of an employee account and subsequent data exfiltration.

What is Multi-Tenant Exposure Through DNS: A Quiet Intelligence Leak

What is Multi-Tenant Exposure Through DNS: A Quiet Intelligence Leak

Feb 15, 2026
Insights / Architecture

An analysis of how multi-tenant DNS architectures can leak customer relationships and how to mitigate the risk.

Understanding CVE-2026-0969: Remote Code Execution in next-mdx-remote

Understanding CVE-2026-0969: Remote Code Execution in next-mdx-remote

Feb 14, 2026
Vulnerability / Web Framework

An analysis of CVE-2026-0969, a critical remote code execution (RCE) vulnerability in the popular next-mdx-remote library for Next.js.

Pentesting Is Not Just About Finding CVEs

Pentesting Is Not Just About Finding CVEs

Feb 14, 2026
Insights / Pentesting

An exploration of why penetration testing goes beyond finding CVEs, focusing on business logic flaws, undocumented vulnerabilities, and real-world attack chains.

AI, Deepfakes, and Custom Malware

AI, Deepfakes, and Custom Malware

Feb 14, 2026
Insights / Social Engineering

An analysis of a coordinated campaign blending social engineering, custom malware, and AI-assisted deception to target the cryptocurrency industry.

Flip-to-Clean: How Malicious Browser Extensions Evade Detection

Flip-to-Clean: How Malicious Browser Extensions Evade Detection

Feb 14, 2026
Insights / Supply Chain

An analysis of the 'flip-to-clean' tactic used by malicious browser extensions to evade detection, especially in the age of AI assistants.

The Hidden Dangers of Downloading Games, Mods, and Cracked Software

The Hidden Dangers of Downloading Games, Mods, and Cracked Software

Feb 14, 2026
Insights / Malware

An analysis of how gaming-related downloads have become a primary vector for infostealer malware, and how users and organizations can protect themselves.

Odido Data Breach: What Happened and What It Really Teaches Us

Odido Data Breach: What Happened and What It Really Teaches Us

Feb 13, 2026
Data Breach / Telecom

An analysis of the Odido data breach, where attackers gained access to a customer contact system, and what it teaches us about data segmentation and third-party risk.

The Conduent / Volvo Group Data Breach: What Happened, Why It Matters, and What It Teaches Us

The Conduent / Volvo Group Data Breach: What Happened, Why It Matters, and What It Teaches Us

Feb 13, 2026
Data Breach / Supply Chain

A seven-level analysis of the Conduent data breach that exposed sensitive information of Volvo Group North America employees, highlighting the impact of third-party compromises.