Product update: Dynamic API Scanning, Recommendations and Classifications, and more
We know the importance of staying ahead of threats. At Detectify, we’re committed to providing you with the tools you...
Read more →We know the importance of staying ahead of threats. At Detectify, we’re committed to providing you with the tools you...
Read more →Cisco warns of a Critical remote code execution flaw in web services across multiple Cisco platforms. Tracked as CVE-2025-20363 (CWE-122),...
Read more →In early 2025, LummaStealer was in widespread use by cybercriminals targeting victims throughout the world in multiple industry verticals, including...
Read more →The threat of an OT cyber-attack isn’t just an operational risk. It’s also a financial one. Companies across critical infrastructure...
Read more →Artificial intelligence (AI) infrastructure provider Nscale has secured $1.1bn in series B funding, a week after it was announced the...
Read more →A novel AI-driven threat leverages LLMs on Hugging Face to execute adaptive reconnaissance and data exfiltration in real time. Rather...
Read more →Google warns of Brickstorm backdoor targeting U.S. legal and tech sectors Pierluigi Paganini September 26, 2025 China-linked actors used Brickstorm...
Read more →Cybersecurity authorities are urging organizations to take immediate action following the discovery of a sophisticated espionage campaign targeting Cisco Adaptive...
Read more →Cisco published Security Advisory cisco-sa-http-code-exec-WmfP3h3O revealing a severe flaw in multiple Cisco platforms that handle HTTP-based management. Tracked as CVE-2025-20363,...
Read more →Here’s a look at the most interesting products from the past month, featuring releases from: Absolute Security, Blackdot Solutions, Catchpoint,...
Read more →Cisco on Thursday released emergency patches for two firewall vulnerabilities exploited as zero-days in attacks linked to the ArcaneDoor espionage...
Read more →Cybercriminals are increasingly turning to artificial intelligence to enhance their attack capabilities, as demonstrated in a sophisticated phishing campaign recently...
Read more →