What Every Board Needs To Know
09
Jan
2025

What Every Board Needs To Know

For years, cyber risk was relegated to the world of information technology (IT), managed by security and engineering teams as…

Inside the tech that continuously monitors our customers' attack surface
09
Jan
2025

Inside the tech that continuously monitors our customers’ attack surface

As part of our Detectify under the hood blog series, we recently introduced our new engine framework and how it…

PoC Exploit Released For Apache Struts Remote Code Execution Vulnerability
09
Jan
2025

PoC Exploit Released For Apache Struts Remote Code Execution Vulnerability

A proof-of-concept (PoC) exploit for the critical Apache Struts vulnerability, CVE-2024-53677, has been publicly released, raising alarm across the cybersecurity…

Wireshark 4.4.3 released: Updated protocol support, bug fixes
09
Jan
2025

Wireshark 4.4.3 released: Updated protocol support, bug fixes

Wireshark, the popular network protocol analyzer, has reached version 4.4.3. Wireshark offers deep inspection across hundreds of protocols, live and…

PoC Exploit Code Released For macOS TCC Bypass Vulnerability
09
Jan
2025

PoC Exploit Code Released For macOS TCC Bypass Vulnerability

A proof-of-concept (PoC) exploit code for a critical vulnerability in macOS, identified as CVE-2024-54527 has been disclosed. This vulnerability allows…

Gitlab Patches Multiple Vulnerabilities Including Resource exhaustion & user manipulation
09
Jan
2025

Gitlab Patches Multiple Vulnerabilities Including Resource exhaustion & user manipulation

GitLab has announced the release of critical updates to its Community Edition (CE) and Enterprise Edition (EE), specifically versions 17.7.1,…

BreachLock Unified Platform provides visibility into the organization’s attack surface
09
Jan
2025

BreachLock Unified Platform provides visibility into the organization’s attack surface

Eliminating the inefficiencies, silos, unnecessary complexity, and coverage gaps that security practitioners have faced with fragmented security tools, the newly…

Privacy Laws
09
Jan
2025

E.U. Commission Fined for Transferring User Data to Meta in Violation of Privacy Laws

Jan 09, 2025Ravie LakshmananData Privacy / GDPR The European General Court on Wednesday fined the European Commission, the primary executive…

The ongoing evolution of the CIS Critical Security Controls
09
Jan
2025

The ongoing evolution of the CIS Critical Security Controls

For decades, the CIS Critical Security Controls (CIS Controls) have simplified enterprises’ efforts to strengthen their cybersecurity posture by prescribing…

Triage in bug bounty | Intigriti
09
Jan
2025

Triage in bug bounty | Intigriti

As we step into 2025, many of us are setting resolutions to improve, grow, and achieve more. At Intigriti, we’re…

Palo Alto Networks Expedition Tool Vulnerability Exposes Firewall Credentials
09
Jan
2025

Palo Alto Networks Expedition Tool Vulnerability Exposes Firewall Credentials

Multiple vulnerabilities in Palo Alto Networks’ Expedition migration tool have been discovered, potentially exposing sensitive firewall credentials, including usernames, cleartext…

Palo Alto Networks Expedition Tool Vulnerability Let Attackers Access Cleartext Passwords
09
Jan
2025

Palo Alto Networks Expedition Tool Vulnerability Let Attackers Access Cleartext Passwords

A series of serious vulnerabilities have been identified in Palo Alto Networks’ Expedition migration tool, which could allow attackers to…