Community-driven PTaaS vs. Traditional Pentesting
Modern pentesting approaches use independent security researchers working under strict NDAs and advanced software platforms to streamline the process. However, with many vendors focusing on…
Modern pentesting approaches use independent security researchers working under strict NDAs and advanced software platforms to streamline the process. However, with many vendors focusing on…
Atlassian fixed six high-severity bugs in Confluence Data Center and Server Pierluigi Paganini June 20, 2024 Australian software company Atlassian addressed multiple high-severity vulnerabilities in…
A suspected Chinese threat actor tracked as UNC3886 uses publicly available open-source rootkits named ‘Reptile’ and ‘Medusa’ to remain hidden on VMware ESXi virtual machines, allowing…
A recent KYC (Know Your Customer) data exposure at Total Fitness, a members-only club in the UK, left personal details of its members exposed online.…
Crown Equipment, a global top five forklift manufacturer, was hit by a cyberattack that has disrupted its manufacturing operations for nearly two weeks. The company…
Advances in technology are making it increasingly possible for retailers and hospitality companies to be more intelligent with their pricing strategies, including multiple intra-day changes…
Threat actors are actively exploiting a SolarWinds Serv-U path-traversal vulnerability, leveraging publicly available proof-of-concept (PoC) exploits. Although the attacks do not appear particularly sophisticated, the…
In a concerning development for cybersecurity, hackers are increasingly leveraging Progressive Web Apps (PWAs) to execute sophisticated phishing attacks aimed at stealing user credentials. This…
Have you ever heard of a Doctrine meant to formulate cyber space operations? Well, here’s a news piece that might interest you a bit. The…
Jun 20, 2024NewsroomCyber Espionage / Hacking News State-sponsored actors with ties to Russia have been linked to targeted cyber attacks aimed at French diplomatic entities,…
Researchers have discovered that various threat actors groups associated with Chinese state-linked espionage have been conducting a sustained hacking campaign targeting telecommunications operators in an…
Car dealership SaaS platform CDK Global suffered an additional breach Wednesday night as it was starting to restore systems shut down in an previous cyberattack. CDK…