How AI Supports Growth Without Overloading Analysts
09
Jan
2025

How AI Supports Growth Without Overloading Analysts

SOC Scalability: How AI Supports Growth Without Overloading Analysts Pierluigi Paganini January 09, 2025 Scaling up a security operations center…

Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft
09
Jan
2025

Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft

Malicious packages “solanacore,” “solana login,” and “walletcore-gen” on npmjs target Solana developers with Windows trojans and malware for keylogging and…

Synology ActiveProtect boosts enterprise data protection
09
Jan
2025

Synology ActiveProtect boosts enterprise data protection

Synology releases ActiveProtect, a new line of data protection appliances designed to provide enterprises a unified backup solution with simplicity,…

What Every Board Needs To Know
09
Jan
2025

What Every Board Needs To Know

For years, cyber risk was relegated to the world of information technology (IT), managed by security and engineering teams as…

Inside the tech that continuously monitors our customers' attack surface
09
Jan
2025

Inside the tech that continuously monitors our customers’ attack surface

As part of our Detectify under the hood blog series, we recently introduced our new engine framework and how it…

PoC Exploit Released For Apache Struts Remote Code Execution Vulnerability
09
Jan
2025

PoC Exploit Released For Apache Struts Remote Code Execution Vulnerability

A proof-of-concept (PoC) exploit for the critical Apache Struts vulnerability, CVE-2024-53677, has been publicly released, raising alarm across the cybersecurity…

Wireshark 4.4.3 released: Updated protocol support, bug fixes
09
Jan
2025

Wireshark 4.4.3 released: Updated protocol support, bug fixes

Wireshark, the popular network protocol analyzer, has reached version 4.4.3. Wireshark offers deep inspection across hundreds of protocols, live and…

PoC Exploit Code Released For macOS TCC Bypass Vulnerability
09
Jan
2025

PoC Exploit Code Released For macOS TCC Bypass Vulnerability

A proof-of-concept (PoC) exploit code for a critical vulnerability in macOS, identified as CVE-2024-54527 has been disclosed. This vulnerability allows…

Gitlab Patches Multiple Vulnerabilities Including Resource exhaustion & user manipulation
09
Jan
2025

Gitlab Patches Multiple Vulnerabilities Including Resource exhaustion & user manipulation

GitLab has announced the release of critical updates to its Community Edition (CE) and Enterprise Edition (EE), specifically versions 17.7.1,…

BreachLock Unified Platform provides visibility into the organization’s attack surface
09
Jan
2025

BreachLock Unified Platform provides visibility into the organization’s attack surface

Eliminating the inefficiencies, silos, unnecessary complexity, and coverage gaps that security practitioners have faced with fragmented security tools, the newly…

Privacy Laws
09
Jan
2025

E.U. Commission Fined for Transferring User Data to Meta in Violation of Privacy Laws

Jan 09, 2025Ravie LakshmananData Privacy / GDPR The European General Court on Wednesday fined the European Commission, the primary executive…

The ongoing evolution of the CIS Critical Security Controls
09
Jan
2025

The ongoing evolution of the CIS Critical Security Controls

For decades, the CIS Critical Security Controls (CIS Controls) have simplified enterprises’ efforts to strengthen their cybersecurity posture by prescribing…