Medusa ransomware hit over 300 critical infrastructure organizations until February 2025
13
Mar
2025

Medusa ransomware hit over 300 critical infrastructure organizations until February 2025

Medusa ransomware hit over 300 critical infrastructure organizations until February 2025 Pierluigi Paganini March 13, 2025 The Medusa ransomware operation…

Burp Everywhere, All Around the World: Bringing AppSec Enthusiasts Together in 2025 | Blog
13
Mar
2025

Burp Everywhere, All Around the World: Bringing AppSec Enthusiasts Together in 2025 | Blog

Amelia Coen | 13 March 2025 at 08:49 UTC Security is a team sport. Whether you’re a pentester, bug bounty…

Jane Devry
13
Mar
2025

Entertaining While Training: Lessons on C and C++ Secure Coding Practices with Tanya Janca

Click here for full interview.  In this show, we speak with Tanya Janca, aka SheHacksPurple, a renowned code security trainer…

FreeType Vulnerability
13
Mar
2025

Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk

Mar 13, 2025Ravie LakshmananOpen Source / Vulnerability Meta has warned that a security vulnerability impacting the FreeType open-source font rendering…

Tenda AC7 Vulnerability Lets Hackers Execute Malicious Payloads for Root Access
13
Mar
2025

Tenda AC7 Vulnerability Lets Hackers Execute Malicious Payloads for Root Access

A vulnerability has been discovered in the Tenda AC7 router, firmware version V15.03.06.44, which allows attackers to execute malicious payloads…

Globee Cybersecurity Awards 2025
13
Mar
2025

Globee Cybersecurity Awards 2025: Cyble Wins Silver

Cupertino, California – March 13, 2025 – Cyble, a leading global cybersecurity and threat intelligence provider, is proud to announce…

Chinese Hacked Exploit Juniper Networks Routers to Implant Backdoor
13
Mar
2025

Chinese Hacked Exploit Juniper Networks Routers to Implant Backdoor

Cybersecurity researchers have uncovered a sophisticated cyber espionage campaign targeting critical network infrastructure, marking a significant evolution in tactics by…

Jane Devry
13
Mar
2025

Most Secure AI Models for Enterprises

For business leaders around the globe, AI promises an exciting edge in innovation and efficiency. The rapid evolution of AI…

GitLab Identifies Security Vulnerabilities Enabling Attacker Logins as Valid Users
13
Mar
2025

GitLab Identifies Security Vulnerabilities Enabling Attacker Logins as Valid Users

GitLab announced the release of versions 17.9.2, 17.8.5, and 17.7.7 for both its Community Edition (CE) and Enterprise Edition (EE)….

CISOs, are your medical devices secure? Attackers are watching closely
13
Mar
2025

CISOs, are your medical devices secure? Attackers are watching closely

The adoption of connected medical devices, collectively called the Internet of Medical Things (IoMT), has transformed patient care. However, this…

FIIG Securities
13
Mar
2025

FIIG Securities Hit With ASIC Lawsuit After Major Breach

The Australian Securities and Investments Commission (ASIC) has taken legal action against FIIG Securities Limited (FIIG) over alleged systemic and…

Fortinet Addresses Security Issues in FortiSandbox, FortiOS, and Other Products
13
Mar
2025

Fortinet Addresses Security Issues in FortiSandbox, FortiOS, and Other Products

Free Webinar – Supply Chain Attack Prevention Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers….