Turning Red-Blue Rivalry into Real Defense
By Sila Ozeren Hacioglu, Security Research Engineer at Picus Security. In many organizations, red and blue teams still work in silos, usually pitted against each…
By Sila Ozeren Hacioglu, Security Research Engineer at Picus Security. In many organizations, red and blue teams still work in silos, usually pitted against each…
The Gootloader malware campaign has resurfaced with sophisticated evasion techniques that allow it to bypass automated security analysis. This persistent threat has been targeting victims…
In the ever-evolving landscape of cyber threats, a new ransomware strain, Midnight, has emerged, echoing the notorious tactics of its predecessor, Babuk. First detected by…
By Sila Ozeren Hacioglu, Security Research Engineer at Picus Security. In many organizations, red and blue teams still work in silos, usually pitted against each…
A critical vulnerability discovered across numerous HTTP/2 implementations has exposed a dangerous protocol-level vulnerability that enables threat actors to orchestrate potent denial-of-service (DoS) and distributed…
An internal Post Office report has been unearthed that reveals the organisation was targeting sales of its flawed Capture system to thousands of branches with…
Google has rolled out an emergency update for its Chrome browser, version 142, to address a series of serious remote code execution (RCE) vulnerabilities that…
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data 05 Nov 2025 • , 4 min. read…
The emergence of AI-powered browsers represents a significant shift in how artificial intelligence interacts with web content. However, it has also introduced unprecedented challenges for…
In Saudi Arabia, where economic diversification and institutional reform are reshaping the role of business, technology is becoming a central thread in how organisations adapt…
Cisco has released security updates to patch a critical vulnerability in the Unified Contact Center Express (UCCX) software, which could enable attackers to execute commands with…
A critical remote code execution (RCE) flaw in three official extensions for Anthropic’s Claude Desktop. These vulnerabilities, affecting the Chrome, iMessage, and Apple Notes connectors,…