News

The attack chains leverage spear-phishing lures as a starting point to activate the infection process and deploy a known ...
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web ...
Discover findings from Pentera's 2025 State of Pentesting Report, including breach rates, alert fatigue, budget trends & the ...
Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed ...
A new cryptojacking campaign dubbed RedisRaider is hijacking publicly exposed Redis servers by injecting cron jobs using ...
Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act ...
Skitnet, also called Bossnet, is a multi-stage malware developed by a threat actor tracked by the company under the name ...
While emerging risks like AI-generated malware capture headlines, the reality of today's threat landscape is more ...
Edouard Bochin and Tao Yan from Palo Alto Networks have been credited with finding and reporting CVE-2025-4918. The discovery ...
CTEM adoption in 2025 improves risk visibility and enables 3x breach reduction by 2026 via real-time validation.
ITP enforces real-time policies using identity and security signals, adding preventive protection between users and apps.
Cloud-first and inherently scalable, SaaS-based platforms can deliver limitless elastic scalability that effortlessly matches ...