<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HTB Blog > Threat Intelligence</title>
        <link>https://www.hackthebox.gr/rss/blog/threat-intelligence</link>
        <description>All the latest news and insights about cybersecurity from Hack The Box. Hacking trends, insights, interviews, stories, and much more</description>
        <language>en</language>
        <atom:link href="https://www.hackthebox.gr/rss/blog/threat-intelligence" rel="self" type="application/rss+xml" />
        <image>
            <url>
                https://www.hackthebox.gr/images/landingv3/logo-htb-blog.svg
            </url>
            <title>HTB Blog > Threat Intelligence</title>
            <link>https://www.hackthebox.gr/rss/blog/threat-intelligence</link>
        </image>
                    <item>
                <title>The Notebook You Trust Could Be Reading Your Secrets</title>
                <link>https://www.hackthebox.gr/blog/path-traversal-vulnerabilities-in-jupyter-nbconvert</link>
                <description>Think Jupyter notebooks are safe? This breakdown reveals how nbconvert path traversal flaws allow file reads and writes without ever executing a single cell.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/cgr1GeCqQHtyRNdOoT84eek4NtYnyBa8.webp" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Threat Intelligence</category>
                <pubDate>Tue, 28 Apr 2026 14:23:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/path-traversal-vulnerabilities-in-jupyter-nbconvert</guid>
            </item>
                    <item>
                <title>War Room: CVE-2026-27944 &amp; CVE-2026-3888</title>
                <link>https://www.hackthebox.gr/blog/CVE-2026-27944-CVE-2026-3888</link>
                <description>Learn all about CVE-2026-27944 and CVE-2026-3888, two high-impact vulnerabilities affecting Nginx-UI and snapd, enabling unauthenticated data exposure and local privilege escalation.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/nZElbTJEmzGTOUYYB3xsYXogXN3PtFSn.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Threat Intelligence</category>
                <pubDate>Mon, 23 Mar 2026 13:27:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/CVE-2026-27944-CVE-2026-3888</guid>
            </item>
                    <item>
                <title>Federal judiciary cyber breach: How SolarWinds and Legacy Systems left US courts exposed</title>
                <link>https://www.hackthebox.gr/blog/us-federal-judiciary-cyberattacks-solarwinds-pacer</link>
                <description>A technical breakdown of the 2020 and 2025 cyberattacks on US federal judiciary systems, including SolarWinds, PACER vulnerabilities, and key defensive lessons.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/QniNTyrJyxqVYSS7s2DMlldQ7mxgvIwr.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Threat Intelligence</category>
                <pubDate>Fri, 30 Jan 2026 13:57:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/us-federal-judiciary-cyberattacks-solarwinds-pacer</guid>
            </item>
                    <item>
                <title>Ni8mare fuel: Chaining n8n CVEs for full compromise in automated workflows</title>
                <link>https://www.hackthebox.gr/blog/n8n-ni8mare-cve-2026-21858-cve-2025-68613</link>
                <description>Dive into Ni8mare (CVE-2026-21858) and CVE-2025-68613—two critical n8n bugs that chain into unauthenticated RCE. See the exploit in action and practice on our new BloodFlow machine.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/BQThGNZAXky2b7XCNCJvPERAFHKs87uR.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Threat Intelligence</category>
                <pubDate>Wed, 28 Jan 2026 16:08:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/n8n-ni8mare-cve-2026-21858-cve-2025-68613</guid>
            </item>
                    <item>
                <title>War Room: CVE-2025-14847—Mongobleed explained</title>
                <link>https://www.hackthebox.gr/blog/war-room-mongobleed-cve-2025-14847-mongodb-memory-leak-vulnerability</link>
                <description>Learn all about CVE-2025-14847, the High Vulnerability MongoDB memory leak vulnerability allowing unauthenticated memory disclosure.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/UHhmu7zgdw3iTiU7R2u3QJCXQ06b4SPp.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Threat Intelligence</category>
                <pubDate>Wed, 07 Jan 2026 12:30:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/war-room-mongobleed-cve-2025-14847-mongodb-memory-leak-vulnerability</guid>
            </item>
                    <item>
                <title>Eek, a GodRAT: A step-by-step breakdown of a financial sector attack</title>
                <link>https://www.hackthebox.gr/blog/godrat-financial-sector-attack-analysis</link>
                <description>A deep dive into GodRAT’s financial sector intrusion, mapping its attack chain, steganographic loaders, and RAT techniques to MITRE ATT&amp;CK and real-world defenses.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/cgN7irlBrLBnp5NStJXuPsOGr7cd0J6O.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Threat Intelligence</category>
                <pubDate>Thu, 18 Dec 2025 17:00:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/godrat-financial-sector-attack-analysis</guid>
            </item>
                    <item>
                <title>CVE-2025-55182—The React2Shell vulnerability you need to patch right now</title>
                <link>https://www.hackthebox.gr/blog/react2shell-cve-2025-55182-threat-spotlight</link>
                <description>A deep dive into React2Shell (CVE-2025-55182), the critical remote code execution vulnerability affecting React Server Components and Next.js.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/5E1tQpSQiUUhfIJ7dv0LNBJSySp38A7n.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Threat Intelligence</category>
                <pubDate>Wed, 10 Dec 2025 12:01:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/react2shell-cve-2025-55182-threat-spotlight</guid>
            </item>
                    <item>
                <title>Brewing chaos: How a ransomware group hit Asahi</title>
                <link>https://www.hackthebox.gr/blog/asahi-ransomware-attack-analysis-mitre-mapping-qilin</link>
                <description>Dive into the Asahi ransomware attack. See how Qilin breached operations, mapped to MITRE ATT&amp;CK, and how HTB labs train teams to stop it.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/yQxcvRUkmonNRVa0vUwR9DXfAVvg29II.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Threat Intelligence</category>
                <pubDate>Thu, 20 Nov 2025 09:29:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/asahi-ransomware-attack-analysis-mitre-mapping-qilin</guid>
            </item>
                    <item>
                <title>ICS in the crosshairs: 9 lessons from the Asahi cyber attack</title>
                <link>https://www.hackthebox.gr/blog/industrial-cybersecurity-asahi-attack-lessons</link>
                <description>Based on our recent webinar, we unpack the anatomy of the attack and what it reveals about today’s ICS/OT threat landscape.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/KCv0MMDCLKl9qzsC60eBNSpTlHddsox7.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Threat Intelligence</category>
                <pubDate>Fri, 14 Nov 2025 12:01:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/industrial-cybersecurity-asahi-attack-lessons</guid>
            </item>
                    <item>
                <title>Escaping the Scattered Spider’s web: 6 takeaways from our deep dive</title>
                <link>https://www.hackthebox.gr/blog/dissecting-scattered-spider-webinar-ransomware-social-engineering</link>
                <description>Discover how Scattered Spider blends social engineering with technical precision to launch high-impact ransomware attacks.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/PI00kERdV7JkuLjlOZhCphhC4ZkWd20u.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Threat Intelligence</category>
                <pubDate>Wed, 05 Nov 2025 09:57:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/dissecting-scattered-spider-webinar-ransomware-social-engineering</guid>
            </item>
            </channel>
</rss>
