Fuzzing a single thread to uncover vulnerabilities
08
Mar
2026

Fuzzing a single thread to uncover vulnerabilities

A Cisco Talos researcher worked around the limitations of hardware-level Code Read-out Protection (RDP) on the Socomec DIRIS M-70 gateway by pivoting…

Tenable Cloud Risk Report 2026 chart showing orgs with overprivileged IAM roles in AWS
08
Mar
2026

2026 Cloud security and AI security risk report

AI adoption is outpacing traditional cyber governance. The “Tenable Cloud and AI Security Risk Report 2026” reveals how overprivileged identities…

Shadow Repeater:AI-enhanced manual testing | PortSwigger Research
08
Mar
2026

Shadow Repeater:AI-enhanced manual testing | PortSwigger Research

Have you ever wondered how many vulnerabilities you’ve missed by a hair’s breadth, due to a single flawed choice? We’ve…

The 3 Steps CISOs Must Follow
08
Mar
2026

The 3 Steps CISOs Must Follow

Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real…

long filename pentester trick cover image
08
Mar
2026

Out of sight, out of mind with Windows Long File Names

  I. INTRODUCTION One of the very important issues that red teamers and pentester always have to consider is how to…

LeakBase marketplace unplugged by cops in 14 countries
08
Mar
2026

LeakBase marketplace unplugged by cops in 14 countries

The LeakBase cyberforum, considered one of the world’s largest online marketplaces for cybercriminals to buy and sell stolen data and…

Web portal leaves kids' chats with AI toy open to anyone with Gmail account
08
Mar
2026

Web portal leaves kids’ chats with AI toy open to anyone with Gmail account

Earlier this month, Joseph Thacker’s neighbor mentioned to him that she’d preordered a couple of stuffed dinosaur toys for her…

Tea Jioshvili
08
Mar
2026

AWS achieves 2025 C5 Type 2 attestation report with 183 services in scope 

Amazon Web Services (AWS) is pleased to announce a successful completion of the 2025 Cloud Computing Compliance Criteria Catalogue (C5)…

Beyond Hamas: Militant and Terrorist Groups Involved in the October 7 Attack on Israel
08
Mar
2026

Beyond Hamas: Militant and Terrorist Groups Involved in the October 7 Attack on Israel

October 7: Hamas attacks Israel In the midst of the Israel-Hamas War, which erupted with a surprising and devastating attack…

Threat hunting process
08
Mar
2026

Hunting for malicious OpenClaw AI in the modern enterprise

When shadow IT is discussed, it’s usually in the context of unauthorized SaaS apps or stray cloud buckets. But there’s…

Hackers abuse .arpa DNS and ipv6 to evade phishing defenses
08
Mar
2026

Hackers abuse .arpa DNS and ipv6 to evade phishing defenses

  Threat actors are abusing the special-use “.arpa” domain and IPv6 reverse DNS in phishing campaigns that more easily evade…

SAML roulette: the hacker always wins
08
Mar
2026

SAML roulette: the hacker always wins

Introduction In this post, we’ll show precisely how to chain round-trip attacks and namespace confusion to achieve unauthenticated admin access…