admin
May 25, 2025
Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like...
admin
May 24, 2025
The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called...
admin
May 23, 2025
Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTrap has compromised nearly 5,300 unique network edge...
admin
May 23, 2025
As part of the latest "season" of Operation Endgame, a coalition of law enforcement agencies have taken...
SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

4 min read
admin
May 23, 2025
From zero-day exploits to large-scale bot attacks — the demand for a powerful, self-hosted, and user-friendly web...
admin
May 23, 2025
The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the online infrastructure associated with...
admin
May 23, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday revealed that Commvault is monitoring cyber threat...
admin
May 23, 2025
Cybersecurity researchers have discovered an indirect prompt injection flaw in GitLab's artificial intelligence (AI) assistant Duo that...
admin
May 22, 2025
It’s not enough to be secure. In today’s legal climate, you need to prove it.
Whether you’re protecting...
admin
May 22, 2025
A Chinese-speaking threat actor tracked as UAT-6382 has been linked to the exploitation of a now-patched remote-code-execution...
admin
May 22, 2025
A privilege escalation flaw has been demonstrated in Windows Server 2025 that makes it possible for attackers...
admin
May 22, 2025
A recently patched pair of security flaws affecting Ivanti Endpoint Manager Mobile (EPMM) software has been exploited...
admin
May 22, 2025
For many organizations, identity security appears to be under control. On paper, everything checks out. But new...
admin
May 22, 2025
A sprawling operation undertaken by global law enforcement agencies and a consortium of private sector firms has...
admin
May 21, 2025
Russian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology...
admin
May 21, 2025
Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to practices that automate how code is developed and released...
admin
May 21, 2025
Russian organizations have become the target of a phishing campaign that distributes malware called PureRAT, according to...
admin
May 21, 2025
Counterfeit Facebook pages and sponsored ads on the social media platform are being employed to direct users...
admin
May 21, 2025
It takes just one email to compromise an entire system. A single well-crafted message can bypass filters,...
admin
May 21, 2025
Cybersecurity researchers have discovered a new campaign that employs malicious JavaScript injections to redirect site visitors on...