<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Gatlab Security Blog</title><description>CVE digest, threat intelligence, and cybersecurity research by Gatlab.</description><link>https://blog.gatlab.id/</link><language>en</language><item><title>CVE Weekly Digest — Week 17, 2026</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>Top CRITICAL &amp; HIGH CVEs this week: CVE-2026-6643, CVE-2026-6644, CVE-2026-5963 and more.</description><pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate><category>CVE</category><category>cve</category><category>digest</category><category>weekly</category><category>threat-intel</category></item><item><title>Welcome to Gatlab Security Blog</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>CVE digests, threat intelligence, security tutorials, and research from PT Global Adicita Teknologi. Everything you need to stay ahead of attackers.</description><pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate><category>News</category><category>gatlab</category><category>security</category><category>blog</category><category>announcement</category></item><item><title>CISA Releases 2025 Top Routinely Exploited Vulnerabilities — Key Takeaways</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>CISA&apos;s annual list of most exploited vulnerabilities reveals attackers are consistently targeting known flaws in perimeter devices, VPNs, and web applications. Here&apos;s what you need to know.</description><pubDate>Fri, 24 Apr 2026 00:00:00 GMT</pubDate><category>News</category><category>news</category><category>cisa</category><category>vulnerabilities</category><category>patch-management</category><category>industry</category></item><item><title>ADVISORY: Critical Privilege Escalation in Cisco IOS XE Web UI — 50,000 Devices Exposed</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>Gatlab Security Advisory: Cisco IOS XE management interface vulnerabilities allow unauthenticated attackers to create privileged accounts. Over 50,000 devices remain unpatched and internet-exposed.</description><pubDate>Thu, 23 Apr 2026 00:00:00 GMT</pubDate><category>Advisory</category><category>advisory</category><category>cisco</category><category>ios-xe</category><category>network</category><category>critical</category><category>patch-now</category></item><item><title>APT29 Targets European Diplomatic Missions with Novel Spear-Phishing Campaign</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>Russia&apos;s APT29 (Cozy Bear) is conducting a sophisticated spear-phishing campaign against European embassies using wine-tasting event lures and a new malware loader called WINELOADER.</description><pubDate>Wed, 22 Apr 2026 00:00:00 GMT</pubDate><category>Threat Intel</category><category>threat-intel</category><category>apt29</category><category>russia</category><category>spearphishing</category><category>diplomacy</category><category>espionage</category></item><item><title>CVE-2025-0282: Critical RCE in Ivanti Connect Secure Actively Exploited</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>A stack-based buffer overflow in Ivanti Connect Secure allows unauthenticated remote code execution. CISA confirms active exploitation in the wild. Patch immediately.</description><pubDate>Mon, 20 Apr 2026 00:00:00 GMT</pubDate><category>CVE</category><category>cve</category><category>ivanti</category><category>vpn</category><category>rce</category><category>critical</category><category>zero-day</category></item><item><title>Setting Up Wazuh SIEM: A Complete Beginner&apos;s Guide</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>Step-by-step guide to deploying Wazuh — the open-source SIEM and XDR platform — on a single server, enrolling agents, and writing your first detection rules.</description><pubDate>Sat, 18 Apr 2026 00:00:00 GMT</pubDate><category>Tutorial</category><category>tutorial</category><category>wazuh</category><category>siem</category><category>detection</category><category>monitoring</category><category>blue-team</category></item><item><title>CVE-2025-24085: Apple Core Media Zero-Day Exploited in the Wild</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>A use-after-free vulnerability in Apple&apos;s Core Media framework allows a malicious application to elevate privileges. Apple confirms active exploitation against iOS versions prior to 17.2.</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>CVE</category><category>cve</category><category>apple</category><category>ios</category><category>macos</category><category>privilege-escalation</category><category>zero-day</category></item><item><title>Modern Browser Memory Corruption: From Bug to Full Compromise</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>A technical research breakdown of how memory corruption vulnerabilities in browsers are discovered, exploited, and chained to achieve full system compromise in modern web browsers.</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>Research</category><category>research</category><category>browser</category><category>memory-corruption</category><category>exploit</category><category>v8</category><category>chrome</category><category>pwn</category></item><item><title>Major Healthcare Provider Breach: 10M Patient Records Exposed via Unpatched VPN</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>A healthcare provider suffered a massive data breach affecting 10 million patients after attackers exploited an unpatched Ivanti VPN vulnerability. HIPAA violations expected, $50M+ in fines projected.</description><pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate><category>News</category><category>news</category><category>data-breach</category><category>healthcare</category><category>hipaa</category><category>vpn</category><category>ivanti</category></item><item><title>ADVISORY: Mass Exploitation of WordPress Plugins — 1M+ Sites at Risk</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>Multiple critical vulnerabilities in popular WordPress plugins are being mass-exploited by automated bots. Sites running LiteSpeed Cache, Elementor Pro, and WP Fastest Cache should update immediately.</description><pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate><category>Advisory</category><category>advisory</category><category>wordpress</category><category>plugin</category><category>cms</category><category>webserver</category><category>patch-now</category></item><item><title>BlackCat/ALPHV Ransomware: Technical Deep Dive and Defense Strategies</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>A comprehensive technical analysis of the BlackCat/ALPHV ransomware-as-a-service operation, including TTPs, encryption mechanisms, and effective defensive countermeasures.</description><pubDate>Wed, 08 Apr 2026 00:00:00 GMT</pubDate><category>Threat Intel</category><category>threat-intel</category><category>ransomware</category><category>blackcat</category><category>alphv</category><category>analysis</category><category>defense</category></item><item><title>Burp Suite for Web Pentesting: From Zero to First Finding</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>A hands-on introduction to Burp Suite Community Edition — setting up your proxy, intercepting requests, using Repeater, and finding your first web vulnerability.</description><pubDate>Sun, 05 Apr 2026 00:00:00 GMT</pubDate><category>Tutorial</category><category>tutorial</category><category>burp-suite</category><category>web</category><category>pentesting</category><category>owasp</category><category>proxy</category></item><item><title>Supply Chain Attacks in Open Source: Anatomy of the xz-utils Backdoor</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>A deep technical analysis of the XZ Utils backdoor (CVE-2024-3094) — how a sophisticated 2-year social engineering campaign nearly compromised most Linux systems globally.</description><pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate><category>Research</category><category>research</category><category>supply-chain</category><category>xz-utils</category><category>backdoor</category><category>open-source</category><category>social-engineering</category></item><item><title>BSSN Launches Indonesia National Cyber Drill 2026: What Organizations Need to Know</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>Indonesia&apos;s national cybersecurity agency BSSN is conducting its largest-ever cyber drill involving 300+ government agencies and critical infrastructure operators. Preparation guide and key dates inside.</description><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><category>News</category><category>news</category><category>bssn</category><category>indonesia</category><category>cyber-drill</category><category>government</category><category>incident-response</category></item><item><title>CVE-2024-55591: Fortinet FortiGate Auth Bypass — Mass Exploitation Underway</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>An authentication bypass vulnerability in Fortinet FortiOS management interface allows attackers to gain super-admin privileges. Over 15,000 firewalls confirmed compromised globally.</description><pubDate>Sat, 28 Mar 2026 00:00:00 GMT</pubDate><category>CVE</category><category>cve</category><category>fortinet</category><category>fortigate</category><category>firewall</category><category>auth-bypass</category><category>critical</category></item><item><title>ADVISORY: VMware vCenter Critical RCE — Patch Your Virtualization Infrastructure Now</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>Critical unauthenticated remote code execution vulnerabilities in VMware vCenter Server are being exploited by ransomware groups to compromise entire virtualized infrastructures.</description><pubDate>Wed, 25 Mar 2026 00:00:00 GMT</pubDate><category>Advisory</category><category>advisory</category><category>vmware</category><category>vcenter</category><category>virtualization</category><category>rce</category><category>critical</category><category>ransomware</category></item><item><title>Writing YARA Rules for Malware Detection: A Practical Guide</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>Learn to write effective YARA rules from scratch — from basic string matching to advanced conditions, byte patterns, and PE module usage for detecting malware families.</description><pubDate>Sun, 22 Mar 2026 00:00:00 GMT</pubDate><category>Tutorial</category><category>tutorial</category><category>yara</category><category>malware</category><category>detection</category><category>threat-hunting</category><category>blue-team</category></item><item><title>Lazarus Group&apos;s $1.5B Cryptocurrency Exchange Heist: A Full Post-Mortem</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>North Korea&apos;s Lazarus Group executed the largest cryptocurrency theft in history by compromising a developer&apos;s machine via a fake job interview. We break down the full attack chain.</description><pubDate>Fri, 20 Mar 2026 00:00:00 GMT</pubDate><category>Threat Intel</category><category>threat-intel</category><category>lazarus</category><category>north-korea</category><category>crypto</category><category>apt</category><category>supply-chain</category></item><item><title>AI-Powered Phishing: How LLMs Are Transforming Social Engineering Attacks</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>Research findings on how threat actors leverage large language models to generate hyper-personalized phishing emails, bypass spam filters, and scale spear-phishing attacks previously requiring manual effort.</description><pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate><category>Research</category><category>research</category><category>ai</category><category>llm</category><category>phishing</category><category>social-engineering</category><category>gpt</category></item><item><title>ADVISORY: Palo Alto Networks GlobalProtect Command Injection — Unauthenticated RCE</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>A command injection vulnerability in Palo Alto Networks PAN-OS GlobalProtect gateway enables unauthenticated remote code execution. CISA confirms active exploitation by state-sponsored actors.</description><pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate><category>Advisory</category><category>advisory</category><category>palo-alto</category><category>pan-os</category><category>vpn</category><category>command-injection</category><category>rce</category><category>state-actor</category></item><item><title>CVE-2025-21298: Windows OLE Zero-Click RCE via Email — Patch Now</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>A critical zero-click vulnerability in Windows OLE allows remote code execution simply by previewing a malicious email in Outlook. No user interaction required.</description><pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate><category>CVE</category><category>cve</category><category>windows</category><category>ole</category><category>outlook</category><category>rce</category><category>zero-click</category><category>microsoft</category></item><item><title>Network Traffic Analysis with Wireshark: Blue Team Essentials</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>Master Wireshark for security analysis — capture filters, display filters, following streams, detecting port scans, and identifying C2 traffic in network captures.</description><pubDate>Sun, 08 Mar 2026 00:00:00 GMT</pubDate><category>Tutorial</category><category>tutorial</category><category>wireshark</category><category>network</category><category>traffic-analysis</category><category>blue-team</category><category>pcap</category></item><item><title>Salt Typhoon: Inside the Largest Telecom Espionage Campaign in US History</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>Chinese APT Salt Typhoon breached at least 9 major US telecommunications providers, accessing wiretap systems and senior officials&apos; communications. A deep dive into the TTPs and geopolitical implications.</description><pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate><category>Threat Intel</category><category>threat-intel</category><category>salt-typhoon</category><category>china</category><category>telecom</category><category>espionage</category><category>apt</category><category>lawful-intercept</category></item><item><title>DNS Tunneling for C2: Detection and Mitigation Deep Dive</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>A technical examination of how attackers use DNS as a covert command-and-control channel, the encoding techniques employed, and proven detection methods for defenders.</description><pubDate>Sat, 28 Feb 2026 00:00:00 GMT</pubDate><category>Research</category><category>research</category><category>dns</category><category>tunneling</category><category>c2</category><category>detection</category><category>threat-hunting</category></item><item><title>EU NIS2 Directive Now Fully Enforceable: What Global Organizations Must Do</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>The EU&apos;s NIS2 Directive entered full enforcement in 2025 with penalties of up to €10M or 2% of global revenue. We break down who&apos;s covered, what&apos;s required, and how to comply.</description><pubDate>Wed, 25 Feb 2026 00:00:00 GMT</pubDate><category>News</category><category>news</category><category>nis2</category><category>eu</category><category>compliance</category><category>regulation</category><category>governance</category></item><item><title>ADVISORY: regreSSHion — Critical OpenSSH RCE Returns After 18 Years</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>CVE-2024-6387 (regreSSHion) is a race condition in OpenSSH&apos;s signal handler that allows unauthenticated remote code execution as root. Affects 14 million internet-exposed servers.</description><pubDate>Fri, 20 Feb 2026 00:00:00 GMT</pubDate><category>Advisory</category><category>advisory</category><category>openssh</category><category>rce</category><category>linux</category><category>critical</category><category>race-condition</category></item><item><title>Volt Typhoon: Chinese APT Pre-Positioning in US Critical Infrastructure</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>CISA, NSA, and FBI jointly warn that Volt Typhoon has maintained persistent access to US critical infrastructure for 5+ years, pre-positioning for potential disruption during geopolitical conflict.</description><pubDate>Wed, 18 Feb 2026 00:00:00 GMT</pubDate><category>Threat Intel</category><category>threat-intel</category><category>volt-typhoon</category><category>china</category><category>critical-infrastructure</category><category>ics</category><category>scada</category><category>apt</category></item><item><title>Build a Cybersecurity Home Lab in 2026: Complete Setup Guide</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>Everything you need to build a professional-grade security home lab for under $0 — using free virtualization, vulnerable VMs, and open-source security tools to practice real-world skills.</description><pubDate>Sun, 15 Feb 2026 00:00:00 GMT</pubDate><category>Tutorial</category><category>tutorial</category><category>home-lab</category><category>virtualbox</category><category>kali</category><category>practice</category><category>red-team</category><category>blue-team</category></item><item><title>IoT Firmware Security Analysis: Finding Vulnerabilities in Embedded Devices</title><link>https://blog.gatlab.id/posts/undefined/</link><guid isPermaLink="true">https://blog.gatlab.id/posts/undefined/</guid><description>A practical guide to IoT firmware analysis — extracting firmware, emulating with QEMU, finding hardcoded credentials, and identifying vulnerable services using open-source tools.</description><pubDate>Tue, 10 Feb 2026 00:00:00 GMT</pubDate><category>Research</category><category>research</category><category>iot</category><category>firmware</category><category>embedded</category><category>binwalk</category><category>qemu</category><category>hardware-security</category></item></channel></rss>