Understanding Exposure Management, Pentesting, Red Teaming and RBVM
It comes as no surprise that today’s cyber threats are orders of magnitude more complex than those of the past....
Read more →It comes as no surprise that today’s cyber threats are orders of magnitude more complex than those of the past....
Read more →Okta reported an “unprecedented scale” of credential stuffing attacks targeting its identity and access management solutions, resulting in the breach...
Read more →In case you missed it on our Twitter channel, we’ve recently launched Misconfigurations Mapper (or MisconfigMapper for short)! Misconfig Mapper...
Read more →Tanto Security has disclosed critical vulnerabilities in the widely-used open-source service Judge0, which could allow attackers to perform a sandbox...
Read more →A large botnet-as-a-service network originating from China was discovered, which comprises numerous domains, over 20 active Telegram groups, and utilizes...
Read more →Brokewell malware poses a new cybersecurity threat to your device and personal information. Unlike your typical data-stealing app, Brokewell takes...
Read more →The United Kingdom has recently passed a groundbreaking data security bill, marking a significant milestone globally. This legislation takes a...
Read more →Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which...
Read more →Apr 29, 2024NewsroomSandbox / Vulnerability Multiple critical security flaws have been disclosed in the Judge0 open-source online code execution system...
Read more →Labelled a “bluffer” and an agitator, a former subpostmaster was proved right when he alerted Post Office boss Paula Vennells...
Read more →A threat actor purports to be selling the database of the Central Bank of Argentina on a hackers’ forum. The...
Read more →The threat actor USDoD claimed that they had published the Personally Identifiable Information (PII) of about 2 million members of...
Read more →