The Green Bay Packers, Inc. has confirmed that its online merchandise store was hacked, leading to the theft of credit…
Then, between Christmas Eve and New Year’s, came a new deluge of swattings. They hit close to a hundred politicians…
A Data Leak Site (DLS) belonging to a new extortion group named Morpheus, which has stolen data from Arrotex Pharmaceuticals…
Jan 09, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors are attempting to take advantage of a recently disclosed security flaw…
SOC Scalability: How AI Supports Growth Without Overloading Analysts Pierluigi Paganini January 09, 2025 Scaling up a security operations center…
Malicious packages “solanacore,” “solana login,” and “walletcore-gen” on npmjs target Solana developers with Windows trojans and malware for keylogging and…
Synology releases ActiveProtect, a new line of data protection appliances designed to provide enterprises a unified backup solution with simplicity,…
For years, cyber risk was relegated to the world of information technology (IT), managed by security and engineering teams as…
As part of our Detectify under the hood blog series, we recently introduced our new engine framework and how it…
A proof-of-concept (PoC) exploit for the critical Apache Struts vulnerability, CVE-2024-53677, has been publicly released, raising alarm across the cybersecurity…
Wireshark, the popular network protocol analyzer, has reached version 4.4.3. Wireshark offers deep inspection across hundreds of protocols, live and…
A proof-of-concept (PoC) exploit code for a critical vulnerability in macOS, identified as CVE-2024-54527 has been disclosed. This vulnerability allows…











