Hikvision Multiple Products Vulnerability Allow Malicious User to Escalate Privileges
09
Mar
2026

Hikvision Multiple Products Vulnerability Allow Malicious User to Escalate Privileges

Hikvision Multiple Products Vulnerability A severe vulnerability affecting multiple Hikvision products was added to the Known Exploited Vulnerabilities (KEV) catalog…

Top 10 web hacking techniques of 2023
09
Mar
2026

Top 10 web hacking techniques of 2023

Welcome to the Top 10 Web Hacking Techniques of 2023, the 17th edition of our annual community-powered effort to identify…

Cybercrime Group in Vietnam Enables Massive Fraudulent Signups
09
Mar
2026

Cybercrime Group in Vietnam Enables Massive Fraudulent Signups

A wave of fraudulent account registrations to a cybercrime ecosystem operating out of Vietnam. These fake accounts are not just…

09
Mar
2026

OpenAI joins the race in AI-assisted code security

OpenAI introduced Codex Security⁠, an AI agent that reviews codebases to find, verify, and help fix software vulnerabilities. The launch…

Pentagon Designates Anthropic
09
Mar
2026

Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute

Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence…

Airspace disruption and geopolitical tensions raise questions over Middle East tech events
09
Mar
2026

Airspace disruption and geopolitical tensions raise questions over Middle East tech events

Geopolitical tensions in the Middle East following the escalating confrontation among the US, Israel and Iran have raised questions about…

How AI will impact security careers and what leaders should do about it
09
Mar
2026

How AI will impact security careers and what leaders should do about it

Security teams are optimistic about AI’s impact on their careers, but workloads remain high. Tines’ Voice of Security 2026 report…

Rogues gallery: 15 worst ransomware groups active today
09
Mar
2026

Rogues gallery: 15 worst ransomware groups active today

Targeted victims: LockBit targeted thousands of victims worldwide in its heyday, including government services, private sector companies, and critical infrastructure…

Lessons From Clop: Combating Ransomware
09
Mar
2026

Lessons From Clop: Combating Ransomware

Lessons from Clop It’s been one month since the Clop ransomware group began exploiting the MOVEit vulnerability (CVE-2023-34362 (VulnDB ID:…

Rogue RMMs: Common Social Engineering Tactics We Saw in 2025
09
Mar
2026

Rogue RMMs: Common Social Engineering Tactics We Saw in 2025

Special thanks to Austin Worline for his contributions to this blog post. The Huntress Security Operations Center (SOC) frequently comes…

Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS
09
Mar
2026

Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS

ExifTool Flaw Malicious Images Trigger Code Execution on macOS A newly discovered vulnerability is challenging the long-held belief that macOS…

Using form hijacking to bypass CSP
09
Mar
2026

Using form hijacking to bypass CSP

In this post we’ll show you how to bypass CSP by using an often overlooked technique that can enable password…