14
Mar
2025

New infosec products of the week: March 14, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Alloy, Detectify, Pondurance, and SimSpace….

Jane Devry
14
Mar
2025

Cybersecurity in the Age of Scarcity

Ditching ‘More People, More Controls’ for a Smarter Approach With all the layoffs happening in the federal government, the world…

Jane Devry
14
Mar
2025

Blockchain and cyber security – Cybersecurity Insiders

The global blockchain security market is projected to grow from an estimated US$20bn in 2024 to $250bn in the next…

Jane Devry
14
Mar
2025

The DevOps Threats Unwrapped: over 502 incidents and 955 hours of disruptions in GitHub, GitLab, Atlassian, and Azure DevOps

502 incidents, including 48 at the highest risk level, resulting in a total of 955 hours of major and critical…

AI Chatbot DeepSeek R1 Can Be Manipulated to Create Malware
14
Mar
2025

AI Chatbot DeepSeek R1 Can Be Manipulated to Create Malware

Tenable Research reveals that AI chatbot DeepSeek R1 can be manipulated to generate keyloggers and ransomware code. While not fully…

Cold Wallets vs. Hot Wallets: Which Offers Better Security?
14
Mar
2025

Cold Wallets vs. Hot Wallets: Which Offers Better Security?

Cryptocurrency isn’t just a buzzword anymore. By December 2024, the number of global cryptocurrency owners reached approximately 659 million, marking…

U.S. CISA adds Apple products and Juniper Junos OS flaws to its Known Exploited Vulnerabilities catalog
14
Mar
2025

U.S. CISA adds Apple products and Juniper Junos OS flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Apple products and Juniper Junos OS flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini March 14, 2025 U.S….

Bitdefender Warns of Multiple Vulnerabilities that Let Attackers Execute MITM Attack
14
Mar
2025

Bitdefender Warns of Multiple Vulnerabilities that Let Attackers Execute MITM Attack

Bitdefender has disclosed two critical vulnerabilities affecting its BOX v1 device that could allow network-adjacent attackers to execute Man-in-the-Middle (MITM)…

Mozilla Urging Users to Update Firefox, Else Add-ons Will Stop Working
14
Mar
2025

Mozilla Urging Users to Update Firefox, Else Add-ons Will Stop Working

Mozilla has issued an urgent warning to Firefox users worldwide, emphasizing the critical need to update their browsers before March…

GitLab addressed critical auth bypass flaws in CE and EE)
14
Mar
2025

GitLab addressed critical auth bypass flaws in CE and EE)

GitLab addressed critical auth bypass flaws in CE and EE Pierluigi Paganini March 13, 2025 GitLab addressed two critical authentication…

Picus Red Report 2025 header
14
Mar
2025

Unmasking a 3X Spike in Credential Theft and Debunking the AI Hype

Cybercriminals have turned password theft into a booming enterprise, malware targeting credential stores jumped from 8% of samples in 2023…

2-year-old Windows Kernel 0-day Vulnerability Exploited in the Wild
14
Mar
2025

2-year-old Windows Kernel 0-day Vulnerability Exploited in the Wild

Microsoft has patched a critical Windows Kernel vulnerability that has been actively exploited for nearly two years.  The vulnerability, tracked…