Turning Red-Blue Rivalry into Real Defense
By Sila Ozeren Hacioglu, Security Research Engineer at Picus Security. In many organizations, red and blue teams still work in silos, usually pitted against each…
By Sila Ozeren Hacioglu, Security Research Engineer at Picus Security. In many organizations, red and blue teams still work in silos, usually pitted against each…
A sophisticated Remote Access Trojan labeled EndClient RAT has emerged as a significant threat targeting human rights defenders in North Korea, marking another escalation in…
Cisco has issued a critical warning about ongoing attacks targeting a severe remote code execution vulnerability affecting its Secure Firewall, Adaptive Security Appliance, and Threat…
A new report from Tenable Research has exposed seven security flaws in OpenAI’s ChatGPT (including GPT-5) that can be used to steal private user data…
Nov 06, 2025Ravie LakshmananMalware / Vulnerability A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks…
Microsoft is forming a new team that wants to build artificial intelligence that is vastly more capable than humans in certain domains, starting with medical…
By Sila Ozeren Hacioglu, Security Research Engineer at Picus Security. In many organizations, red and blue teams still work in silos, usually pitted against each…
The Gootloader malware campaign has resurfaced with sophisticated evasion techniques that allow it to bypass automated security analysis. This persistent threat has been targeting victims…
In the ever-evolving landscape of cyber threats, a new ransomware strain, Midnight, has emerged, echoing the notorious tactics of its predecessor, Babuk. First detected by…
By Sila Ozeren Hacioglu, Security Research Engineer at Picus Security. In many organizations, red and blue teams still work in silos, usually pitted against each…
A critical vulnerability discovered across numerous HTTP/2 implementations has exposed a dangerous protocol-level vulnerability that enables threat actors to orchestrate potent denial-of-service (DoS) and distributed…
An internal Post Office report has been unearthed that reveals the organisation was targeting sales of its flawed Capture system to thousands of branches with…