admin
January 23, 2025
Are your websites leaking sensitive data? New research reveals that 45% of third-party apps access user info...
admin
January 23, 2025
Cybersecurity researchers have disclosed details of a new BackConnect (BC) malware that has been developed by threat...
admin
January 23, 2025
Cisco has released software updates to address a critical security flaw impacting Meeting Management that could permit...
admin
January 23, 2025
Google on Wednesday shed light on a financially motivated threat actor named TRIPLESTRENGTH for its opportunistic targeting...
admin
January 22, 2025
The new Trump administration has terminated all memberships of advisory committees that report to the Department of...
admin
January 22, 2025
Threat actors are exploiting an unspecified zero-day vulnerability in Cambium Networks cnPilot routers to deploy a variant...
Discover Hidden Browsing Threats: Free Risk Assessment for GenAI, Identity, Web, and SaaS Risks

3 min read
admin
January 22, 2025
As GenAI tools and SaaS platforms become a staple component in the employee toolkit, the risks associated...
admin
January 22, 2025
U.S. President Donald Trump on Tuesday granted a "full and unconditional pardon" to Ross Ulbricht, the creator...
admin
January 22, 2025
A previously undocumented China-aligned advanced persistent threat (APT) group named PlushDaemon has been linked to a supply...
admin
January 22, 2025
Oracle is urging customers to apply its January 2025 Critical Patch Update (CPU) to address 318 new...
admin
January 22, 2025
Web infrastructure and security company Cloudflare on Tuesday said it detected and blocked a 5.6 Terabit per...
admin
January 21, 2025
A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitting top secret...
admin
January 21, 2025
Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in AVTECH IP cameras...
admin
January 21, 2025
A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagate...
admin
January 21, 2025
Cybersecurity researchers are calling attention to a series of cyber attacks that have targeted Chinese-speaking regions like...
HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects

4 min read
admin
January 21, 2025
Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, "Were...
admin
January 21, 2025
The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown threat actors...
admin
January 20, 2025
As the digital world becomes more complicated, the lines between national security and cybersecurity are starting to...
admin
January 20, 2025
Every week seems to bring news of another data breach, and it’s no surprise why: securing sensitive...
admin
January 20, 2025
New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a...