admin
June 27, 2025
Threat hunters have discovered a network of more than 1,000 compromised small office and home office (SOHO)...
admin
June 27, 2025
A China-linked threat actor known as Mustang Panda has been attributed to a new cyber espionage campaign...
admin
June 27, 2025
Security operations centers (SOCs) are under pressure from both sides: threats are growing more complex and frequent,...
admin
June 27, 2025
A new campaign has been observed leveraging fake websites advertising popular software such as WPS Office, Sogou,...
admin
June 27, 2025
Threat intelligence firm GreyNoise is warning of a "notable surge" in scanning activity targeting Progress MOVEit Transfer...
admin
June 27, 2025
Cybersecurity researchers have detailed a new campaign dubbed OneClik that leverages Microsoft's ClickOnce software deployment technology and...
admin
June 27, 2025
Cybersecurity researchers have disclosed a critical vulnerability in the Open VSX Registry ("open-vsx[.]org") that, if successfully exploited,...
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access

2 min read
admin
June 26, 2025
Cisco has released updates to address two maximum-severity security flaws in Identity Services Engine (ISE) and ISE...
admin
June 26, 2025
The ClickFix social engineering tactic as an initial access vector using fake CAPTCHA verifications increased by 517%...
admin
June 26, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added three security flaws, each impacting AMI...
The Hidden Risks of SaaS: Why Built-In Protections Aren’t Enough for Modern Data Resilience

6 min read
admin
June 26, 2025
SaaS Adoption is Skyrocketing, Resilience Hasn’t Kept Pace
SaaS platforms have revolutionized how businesses operate. They simplify collaboration,...
admin
June 26, 2025
An Iranian state-sponsored hacking group associated with the Islamic Revolutionary Guard Corps (IRGC) has been linked to...
Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa

3 min read
admin
June 26, 2025
Cybersecurity researchers are calling attention to a series of cyber attacks targeting financial organizations across Africa since...
admin
June 26, 2025
Popular messaging platform WhatsApp has added a new artificial intelligence (AI)-powered feature that leverages its in-house solution...
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery

3 min read
admin
June 25, 2025
New research has uncovered continued risk from a known security weakness in Microsoft's Entra ID, potentially enabling...
admin
June 25, 2025
Citrix has released security updates to address a critical flaw affecting NetScaler ADC that it said has...
admin
June 25, 2025
Cybersecurity researchers have detailed two now-patched security flaws in SAP Graphical User Interface (GUI) for Windows and...
admin
June 25, 2025
Thousands of personal records allegedly linked to athletes and visitors of the Saudi Games have been published...
admin
June 25, 2025
If you invite guest users into your Entra ID tenant, you may be opening yourself up to...
admin
June 25, 2025
Unknown threat actors have been distributing a trojanized version of SonicWall's SSL VPN NetExtender application to steal...