admin
January 21, 2025
Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in AVTECH IP cameras...
admin
January 21, 2025
A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagate...
admin
January 21, 2025
Cybersecurity researchers are calling attention to a series of cyber attacks that have targeted Chinese-speaking regions like...
HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects

4 min read
admin
January 21, 2025
Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, "Were...
admin
January 21, 2025
The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown threat actors...
admin
January 20, 2025
As the digital world becomes more complicated, the lines between national security and cybersecurity are starting to...
admin
January 20, 2025
Every week seems to bring news of another data breach, and it’s no surprise why: securing sensitive...
admin
January 20, 2025
New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a...
admin
January 20, 2025
The Threat actor known as DoNot Team has been linked to a new Android malware as part...
admin
January 20, 2025
Cybersecurity researchers have identified three sets of malicious packages across the npm and Python Package Index (PyPI)...
admin
January 19, 2025
Popular video-sharing social network TikTok has officially gone dark in the United States, 2025, as a federal...
admin
January 18, 2025
The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) has imposed sanctions against a Chinese cybersecurity...
admin
January 17, 2025
Cybersecurity researchers have disclosed three security flaws in Planet Technology's WGS-804HPT industrial switches that could be chained...
admin
January 17, 2025
Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based applications to promote gambling...
admin
January 17, 2025
Recent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure security in modern business...
admin
January 17, 2025
The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned two individuals and four entities for...
admin
January 17, 2025
Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing kit that's capable of Microsoft 365 accounts with...
admin
January 17, 2025
Austrian privacy non-profit None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN,...
Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting

3 min read
admin
January 16, 2025
The Russian threat actor known as Star Blizzard has been linked to a new spear-phishing campaign that...
admin
January 16, 2025
You can tell the story of the current state of stolen credential-based attacks in three numbers:
Stolen credentials...