SentinelOne to Boost Cloud Security by Acquiring PingSafe
SentinelOne, the leading AI-powered security company, has made a significant move in the cloud security landscape by acquiring PingSafe, a pioneer in cloud-native application protection…
SentinelOne, the leading AI-powered security company, has made a significant move in the cloud security landscape by acquiring PingSafe, a pioneer in cloud-native application protection…
Previously, in December 2023, it was reported that SSH servers were vulnerable to the new Terrapin Attack in which threat actors can downgrade an SSH…
A free and open-source packet analyzer, Wireshark is used for network troubleshooting, education, software and communications protocol development, and analysis. The widespread use of Wireshark…
Malicious stockpiled domains are the collection of domain names that threat actors acquire in advance for several types of future malicious activities like:- Phishing attacks…
Kernel vulnerabilities are prevalent in operating systems and can affect billions of devices. One of the most widely used tools for kernel fuzzing is the…
A landmark settlement has been reached in a class-action lawsuit against Google, accusing the tech giant of breaching user privacy by tracking activity in “private…
Bug bounty platforms play a crucial role in the cybersecurity ecosystem by enabling organizations to leverage the expertise of external security researchers to identify and…
By employing a multitude of advanced techniques like double extortion along with other illicit tactics, ransomware groups are continually evolving at a rapid pace. In…
Threat actors, particularly those with financial motivations, have been observed spreading malware via the ms-appinstaller URI scheme (App Installer). As a result of this activity,…
Palo Alto Networks (PANW), the cybersecurity juggernaut, has officially acquired Talon Cyber Security, a pioneer in enterprise browser technology. This strategic move extends the reach…
Hackers use weaponized LNK files to exploit vulnerabilities in Windows operating systems. These files often contain malicious code that can be executed when the user…
The biggest producer of probiotic drinks in the world, Yakult, was the target of a significant that exposed private data and corporate records on the…