Sara: Open-source RouterOS security inspector
Sara is an open-source tool designed to analyze RouterOS configurations and identify security vulnerabilities on MikroTik hardware. Sara’s main feature is using regular expressions as…
Sara is an open-source tool designed to analyze RouterOS configurations and identify security vulnerabilities on MikroTik hardware. Sara’s main feature is using regular expressions as…
Google failed to persuade a US federal judge to dismiss a privacy class action claiming it collected personal data from people’s mobile phones after they…
Researchers observed the Gayfemboy botnet in early 2024 as a basic Mirai variant. Still, the botnet rapidly evolved through iterative development, including UPX polymorphic packing,…
Gravy Analytics, a Virginia-based company whose name has no connection to the actual meaning of “gravy,” has recently found itself in the spotlight for all…
In this Help Net Security interview, Josh Lemos, CISO at GitLab, talks about the shift from DevOps to DevSecOps, focusing on the complexity of building…
Ivanti is warning that a critical security flaw impacting Ivanti Connect Secure, Policy Secure, and ZTA Gateways has come under active exploitation in the wild…
Since 2013, the advanced persistent threat (APT) known as Kimsuky, which the North Korean government sponsors, has been actively conducting cyber espionage operations. It employs…
As we look ahead to cybersecurity developments in 2025, there’s bad news and good—expect to see new challenging attacks and the cybersecurity community increasingly working…
Telstra has signed an agreement with SpaceX to use Starlink to deliver satellite-to-mobile services, starting with SMS this year. Initially, Telstra will trial the satellite-to-mobile…
The Wireshark Foundation has announced the release of Wireshark 4.4.3, the latest version of the world’s most popular network protocol analyzer. This update brings a…
Ivanti has disclosed actively exploiting a critical zero-day vulnerability, CVE-2025-0282, in its Connect Secure VPN appliances. This vulnerability allows unauthenticated remote code execution and has…
SonicWall warns of an exploitable SonicOS vulnerability Pierluigi Paganini January 08, 2025 SonicWall warns customers to address an authentication bypass vulnerability in its firewall’s SonicOS…