In SaaS security conversations, “misconfiguration” and “vulnerability” are often used interchangeably. But they’re not the same thing. And misunderstanding that…
Exposed Without a Breach: The Cost of Data Blindness Pierluigi Paganini August 05, 2025 These are in plain sight without…
SonicWall has warned customers to disable SSLVPN services due to ransomware gangs potentially exploiting an unknown security vulnerability in SonicWall…
A sophisticated attack method where hackers are exploiting a deserialization vulnerability in SharePoint to steal Internet Information Services (IIS) Machine…
FortiGuard Labs has reported a sustained trend in the exploitation of open-source software (OSS) repositories for malware dissemination within supply…
Receiving an unexpected package in the post is not always a pleasant surprise. The FBI has warned the public about…
Amelia Coen | 05 August 2025 at 11:08 UTC Ever wondered how attackers can compromise modern websites by exploiting invisible…
Google has released security patches for six vulnerabilities in Android’s August 2025 security update, including two Qualcomm flaws exploited in…
The open-source software ecosystem, once considered a bastion of collaborative development, has become an increasingly attractive target for cybercriminals seeking…
MediaTek has disclosed three critical security vulnerabilities affecting dozens of its chipsets, potentially allowing attackers to gain elevated system privileges…
Why do SOC teams still drown in alerts even after spending big on security tools? False positives pile up, stealthy…
Microsoft will offer up to $5 million in bounty awards at this year’s Zero Day Quest hacking contest, which the…











