LIVETHREAT INTELLIGENCE
NVD/NISTCVE-2025-29927 β€” Next.js Middleware Auth Bypass Β· All versions <15.2.3 affectedCRITICAL 9.1β—†AlienVault OTXAPT29 (Cozy Bear) β€” Active Spear-Phishing Campaign Targeting NATO DiplomatsCRITICAL 9.3β—†Recorded FutureCl0p Ransomware β€” MOVEit-style Campaign Targeting MFT Solutions GloballyCRITICAL 9.5β—†Shodan22,000+ Redis Instances Exposed on Port 6379 β€” No Auth β€” Cryptominer RiskHIGH 8.9β—†VirusTotalCVE-2025-21298 β€” Windows OLE Remote Code Execution Β· CISA KEV Catalog AddedCRITICAL 9.8β—†Censys14,500+ Exposed Kubernetes API Servers Detected β€” Anonymous Access EnabledHIGH 8.7β—†AlienVault OTXFIN7 Carbanak Group β€” New JavaScript Backdoor Targeting Retail POS SystemsHIGH 8.4β—†NVD/NISTCVE-2025-24813 β€” Apache Tomcat RCE via Partial PUT Β· Exploit Code PublicCRITICAL 9.8β—†Recorded FutureDark Web Auction: 2.1M U.S. Healthcare Records Listed Β· PII + Insurance DataHIGH 8.1β—†VirusTotalLumma Stealer v4.1 β€” New Evasion Bypass for Windows Defender SmartScreenHIGH 8.6β—†NVD/NISTCVE-2025-30065 β€” Apache Parquet RCE via Schema Parsing Β· CVSS Maximum ScoreCRITICAL 10.0β—†Recorded FutureSalt Typhoon (China) β€” Telco Backdoors Persist in 3 U.S. Carriers Post-DisclosureCRITICAL 9.2β—†VirusTotalDragonForce Ransomware β€” New Affiliate Program Attracting LockBit DefectorsHIGH 8.5β—†ShodanCitrix NetScaler Bleed (CVE-2023-4966) β€” 4,800 Unpatched Hosts Still ExploitableCRITICAL 9.4β—†CensysIvanti Connect Secure 0-Day Chain β€” Nation-State Actor Exploitation ConfirmedCRITICAL 9.0β—†AlienVault OTXBEC Surge Q1 2026 β€” $3.1B in Wire Fraud Β· AI Voice Cloning in UseHIGH 7.9β—†NVD/NISTCVE-2025-29927 β€” Next.js Middleware Auth Bypass Β· All versions <15.2.3 affectedCRITICAL 9.1β—†AlienVault OTXAPT29 (Cozy Bear) β€” Active Spear-Phishing Campaign Targeting NATO DiplomatsCRITICAL 9.3β—†Recorded FutureCl0p Ransomware β€” MOVEit-style Campaign Targeting MFT Solutions GloballyCRITICAL 9.5β—†Shodan22,000+ Redis Instances Exposed on Port 6379 β€” No Auth β€” Cryptominer RiskHIGH 8.9β—†VirusTotalCVE-2025-21298 β€” Windows OLE Remote Code Execution Β· CISA KEV Catalog AddedCRITICAL 9.8β—†Censys14,500+ Exposed Kubernetes API Servers Detected β€” Anonymous Access EnabledHIGH 8.7β—†AlienVault OTXFIN7 Carbanak Group β€” New JavaScript Backdoor Targeting Retail POS SystemsHIGH 8.4β—†NVD/NISTCVE-2025-24813 β€” Apache Tomcat RCE via Partial PUT Β· Exploit Code PublicCRITICAL 9.8β—†Recorded FutureDark Web Auction: 2.1M U.S. Healthcare Records Listed Β· PII + Insurance DataHIGH 8.1β—†VirusTotalLumma Stealer v4.1 β€” New Evasion Bypass for Windows Defender SmartScreenHIGH 8.6β—†NVD/NISTCVE-2025-30065 β€” Apache Parquet RCE via Schema Parsing Β· CVSS Maximum ScoreCRITICAL 10.0β—†Recorded FutureSalt Typhoon (China) β€” Telco Backdoors Persist in 3 U.S. Carriers Post-DisclosureCRITICAL 9.2β—†VirusTotalDragonForce Ransomware β€” New Affiliate Program Attracting LockBit DefectorsHIGH 8.5β—†ShodanCitrix NetScaler Bleed (CVE-2023-4966) β€” 4,800 Unpatched Hosts Still ExploitableCRITICAL 9.4β—†CensysIvanti Connect Secure 0-Day Chain β€” Nation-State Actor Exploitation ConfirmedCRITICAL 9.0β—†AlienVault OTXBEC Surge Q1 2026 β€” $3.1B in Wire Fraud Β· AI Voice Cloning in UseHIGH 7.9β—†
HorizonShield Academy

Master Cybersecurity
From Expert Instructors

4 professional courses drawn from industry-recognized books. 70 lessons, quizzes, and certificates.

4
Courses
70
Lessons
30h+
Content
4
Certificates
πŸ›‘οΈ

Cyber Security for Beginners

BeginnerBeginner

Zero to Cyber Security Ninja. Master fundamentals, password security, encryption, Wi-Fi, email, cloud, and identity protection. The essential foundation for anyone entering cybersecurity.

19 lessons ~8h HorizonShield Curriculum
Course Curriculum β€” 19 Lessons
  1. 01
    20 minFree
  2. 02
    25 minFree
  3. 03
    30 minFree
  4. 04
    Phishing and Social Engineering
    25 minπŸ”’
  5. 05
    Network Security Fundamentals
    30 minπŸ”’
  6. 06
    Vulnerability Management
    25 minπŸ”’
  7. 07
    Identity and Access Management
    30 minπŸ”’
  8. 08
    Encryption and PKI
    35 minπŸ”’
  9. 09
    Incident Response Planning
    30 minπŸ”’
  10. 10
    Cloud Security Essentials
    30 minπŸ”’
  11. 11
    Web Application Security
    35 minπŸ”’
  12. 12
    Security Operations and SIEM
    30 minπŸ”’
  13. 13
    Ransomware Defense Strategies
    35 minπŸ”’
  14. 14
    Compliance Frameworks Overview
    30 minπŸ”’
  15. 15
    Threat Intelligence Fundamentals
    30 minπŸ”’
  16. 16
    Security Architecture Principles
    35 minπŸ”’
  17. 17
    Building a Security Program
    40 minπŸ”’
  18. 18
    Security Policies & Compliance
    20 minπŸ”’
  19. 19
    Building a Security Culture
    15 minπŸ”’
Upon Completion
πŸ† Cyber Security for Beginners Certificate
Prerequisites
None β€” Complete beginner OK
πŸ’»

Beginning Ethical Hacking with Kali Linux

IntermediateIntermediate

Penetration testing with Kali Linux. OSI model, Metasploit, SQL injection, exploitation, forensics, and professional report writing. Hands-on ethical hacking from the ground up.

15 lessons ~12h Beginning Ethical Hacking with Kali Linux
Course Curriculum β€” 17 Lessons
  1. 01
    20 minFree
  2. 02
    25 minFree
  3. 03
    30 minFree
  4. 04
    Active Scanning with Nmap
    35 minπŸ”’
  5. 05
    Vulnerability Scanning with OpenVAS
    30 minπŸ”’
  6. 06
    Exploitation with Metasploit Framework
    40 minπŸ”’
  7. 07
    Web Application Penetration Testing
    40 minπŸ”’
  8. 08
    Password Attacks and Cracking
    35 minπŸ”’
  9. 09
    Privilege Escalation Techniques
    40 minπŸ”’
  10. 10
    Network Sniffing and MitM Attacks
    35 minπŸ”’
  11. 11
    Wireless Network Attacks
    35 minπŸ”’
  12. 12
    Post-Exploitation and Persistence
    35 minπŸ”’
  13. 13
    Social Engineering Attack Simulation
    30 minπŸ”’
  14. 14
    Writing Professional Pentest Reports
    35 minπŸ”’
  15. 15
    Advanced Evasion Techniques
    35 minπŸ”’
  16. 16
    Red Team Operations
    40 minπŸ”’
  17. 17
    Building a Home Lab for Practice
    30 minπŸ”’
Upon Completion
πŸ† Beginning Ethical Hacking with Kali Linux Certificate
Prerequisites
Course 1 recommended
🐧

Linux Basics for Hackers

BeginnerAdvanced

Build a Linux foundation for aspiring hackers: file systems, networking, bash scripting, security tools, anonymity, and Python scripting.

17 lessons ~10h Linux Basics for Hackers β€” OccupyTheWeb
Course Curriculum β€” 17 Lessons
  1. 01
    25 minFree
  2. 02
    30 minFree
  3. 03
    25 minFree
  4. 04
    Bash Scripting for Security
    35 minπŸ”’
  5. 05
    File Permissions Deep Dive
    30 minπŸ”’
  6. 06
    Process Management and Analysis
    25 minπŸ”’
  7. 07
    Linux User and Group Management
    30 minπŸ”’
  8. 08
    Log Analysis and Monitoring
    35 minπŸ”’
  9. 09
    Package Management and Software
    25 minπŸ”’
  10. 10
    SSH Hardening and Tunneling
    30 minπŸ”’
  11. 11
    Cron Jobs and Task Scheduling
    30 minπŸ”’
  12. 12
    Linux Firewall and iptables
    35 minπŸ”’
  13. 13
    Network Traffic Analysis
    35 minπŸ”’
  14. 14
    Python Scripting for Security
    40 minπŸ”’
  15. 15
    Steganography and Data Hiding
    30 minπŸ”’
  16. 16
    Digital Forensics Fundamentals
    35 minπŸ”’
  17. 17
    Putting It All Together β€” Attack Simulation
    45 minπŸ”’
Upon Completion
πŸ† Linux Basics for Hackers Certificate
Prerequisites
Basic computer knowledge
πŸ•΅οΈ

Web Application Security & Bug Bounty

AdvancedElite: Dark Web

Master web application penetration testing from OWASP Top 10 to advanced exploitation. Covers Burp Suite, SQL injection, XSS, SSRF, authentication bypass, and real-world bug bounty methodology. Based on the industry-standard reference by Dafydd Stuttard and Marcus Pinto.

17 lessons ~20h The Web Application Hacker's Handbook β€” Stuttard & Pinto
Course Curriculum β€” 17 Lessons
  1. 01
    25 minFree
  2. 02
    35 minFree
  3. 03
    OWASP Top 10: Broken Access Control
    30 minπŸ”’
  4. 04
    SQL Injection β€” From Detection to Exploitation
    40 minπŸ”’
  5. 05
    Cross-Site Scripting (XSS) Deep Dive
    35 minπŸ”’
  6. 06
    Authentication Vulnerabilities
    35 minπŸ”’
  7. 07
    Session Management Attacks
    30 minπŸ”’
  8. 08
    Injection Attacks Beyond SQL
    35 minπŸ”’
  9. 09
    XML External Entity (XXE) Attacks
    30 minπŸ”’
  10. 10
    Server-Side Request Forgery (SSRF)
    35 minπŸ”’
  11. 11
    Business Logic Vulnerabilities
    30 minπŸ”’
  12. 12
    API Security Testing
    35 minπŸ”’
  13. 13
    File Upload Vulnerabilities
    30 minπŸ”’
  14. 14
    OAuth 2.0 and JWT Attacks
    35 minπŸ”’
  15. 15
    Advanced Web Exploitation Techniques
    40 minπŸ”’
  16. 16
    Bug Bounty Methodology and Reporting
    35 minπŸ”’
  17. 17
    Defensive Controls and Secure Development
    30 minπŸ”’
Upon Completion
πŸ† Web Application Security & Bug Bounty Certificate
Prerequisites
Basic computer knowledge
πŸ“š LIBRARY

Reference Books

The authoritative texts behind our curriculum

πŸ“–

Heimdal Security Fundamentals

Heimdal Security Research Team

ISBN: 978-0-0000001-0

The definitive introduction to modern cybersecurity concepts, covering the CIA Triad, threat landscape, malware taxonomy, phishing, network defense, IAM, encryption, incident response, compliance frameworks, and building an enterprise security program. Used as the foundation for the Threat Fundamentals course.

CIA TriadMalwarePhishing
πŸ“–

Beginning Ethical Hacking with Kali Linux

Sanjib Sinha

ISBN: 978-1-4842-3167-2

A hands-on guide to ethical hacking and penetration testing using Kali Linux. Covers reconnaissance, Nmap scanning, OpenVAS vulnerability assessment, Metasploit Framework exploitation, password cracking, privilege escalation, wireless attacks, web application testing, and social engineering simulations. The industry-standard entry point for aspiring penetration testers.

Kali LinuxNmapMetasploit
πŸ“–

Linux Basics for Hackers

OccupyTheWeb

ISBN: 978-1-59327-855-7

A practical guide to using Linux for hacking and security work. Covers filesystem navigation, text manipulation, networking, bash scripting, Python scripting, filesystem and process management, log analysis, steganography, and operational security. Essential reading for anyone pursuing a career in offensive security or security operations.

Linux CLIBash ScriptingPython
πŸ“–

The Web Application Hacker's Handbook

Dafydd Stuttard & Marcus Pinto

ISBN: 978-1-118-02647-2

The definitive guide to finding and exploiting web application security flaws. Covers mapping attack surface, bypassing authentication, session management attacks, SQL injection, XSS, CSRF, XXE, SSRF, access control attacks, logic flaws, and advanced exploitation techniques. The essential reference for web penetration testers and bug bounty hunters.

OWASP Top 10SQL InjectionXSS