Learn Search

Search across all Learn content

SecPod Labs

Security Research

In-depth CVE write-ups, vulnerability analysis, and security intelligence from the SecPod Research team.

Featured Article

Prevention in the Age of AI Vulnerability Discovery

CVE Research

Prevention in the Age of AI Vulnerability Discovery

Anthropic’s Claude Mythos Preview (Project Glasswing) has pushed a new question into the center of security discussions. Anthropic says Mythos has already identified thousands of zero-day vulnerabilities across critical infrastructure, and that in testing it was able to identify and exploit zero-day...

Apr 27, 2026 • 9 min read

Mirai Turns Unsupported D-Link Routers into DDoS Weapons Using CVE-2025-29635

CVE Research

Mirai Turns Unsupported D-Link Routers into DDoS Weapons Using CVE-2025-29635

Researchers have uncovered an active Mirai botnet campaign exploiting CVE-2025-29635, a command-injection vulnerability in legacy D-Link DIR-823X routers, to recruit internet-exposed devices into a distributed denial-of-service (DDoS) botnet. Attackers deploy a Mirai malware variant known as “tuxnok...

Apr 27, 2026 • 4 min read

Inside Nexcorium: How CVE-2024-3721 Fuels a New Wave of Mirai-Based DDoS Botnets

CVE Research

Inside Nexcorium: How CVE-2024-3721 Fuels a New Wave of Mirai-Based DDoS Botnets

Researchers have uncovered an active IoT botnet campaign exploiting two known command-injection vulnerabilities to recruit surveillance cameras and home routers into a distributed denial-of-service (DDoS) army. Dubbed Nexcorium, this new Mirai variant uses CVE-2024-3721, an OS command-injection flaw...

Apr 19, 2026 • 5 min read

Storm-1175 and Medusa Ransomware: Anatomy of a Rapid Multi-Exploit Intrusion

CVE Research

Storm-1175 and Medusa Ransomware: Anatomy of a Rapid Multi-Exploit Intrusion

Threat actors are increasingly moving faster than ever in ransomware operations, shrinking the time between initial compromise and ransomware deployment to maximize impact before defenders can respond. Instead of relying on prolonged persistence, modern ransomware groups are rapidly exploiting newly...

Apr 15, 2026 • 4 min read

Two Zero-Days, 167 Flaws Fixed: Microsoft Delivers a Major April 2026 Patch Tuesday

CVE Research

Two Zero-Days, 167 Flaws Fixed: Microsoft Delivers a Major April 2026 Patch Tuesday

The second Tuesday of April 2026 marked another extensive security update release from Microsoft, addressing a broad range of vulnerabilities across its product ecosystem. This month’s Patch Tuesday resolved a notably high number of security flaws spanning Windows, Microsoft Office, Azure, Edge, SQL...

Apr 14, 2026 • 5 min read

Forged Trust: Improper Certificate Validation in wolfSSL

CVE Research

Forged Trust: Improper Certificate Validation in wolfSSL

CVE-2026-5194 is a critical vulnerability affecting the wolfSSL cryptographic library, a widely used TLS/SSL implementation deployed across embedded systems, IoT devices, networking equipment, and applications.

Apr 13, 2026 • 3 min read

Deep Dive into CVE-2026-34621: Actively Exploited Flaw in Adobe Acrobat Reader

CVE Research

Deep Dive into CVE-2026-34621: Actively Exploited Flaw in Adobe Acrobat Reader

Adobe has released emergency security updates to address a critical vulnerability in Adobe Acrobat Reader, tracked as CVE-2026-34621. This flaw, with a CVSS score of 8.6, is actively exploited in the wild and allows attackers to execute arbitrary code on affected systems via specially crafted PDF fi...

Apr 12, 2026 • 3 min read

APT28 in 2026: Weaponizing Routers and Deploying PRISMEX Across Global Targets

CVE Research

APT28 in 2026: Weaponizing Routers and Deploying PRISMEX Across Global Targets

The Russian state-linked threat actor APT28 (also known as Forest Blizzard and Pawn Storm) has intensified its cyber operations through two major campaigns: a large-scale DNS hijacking operation targeting SOHO routers and a spear-phishing campaign deploying the PRISMEX malware suite.

Apr 12, 2026 • 4 min read