News

The attack chains leverage spear-phishing lures as a starting point to activate the infection process and deploy a known ...
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web ...
Discover findings from Pentera's 2025 State of Pentesting Report, including breach rates, alert fatigue, budget trends & the ...
A new cryptojacking campaign dubbed RedisRaider is hijacking publicly exposed Redis servers by injecting cron jobs using ...
Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed ...
Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act ...
Skitnet, also called Bossnet, is a multi-stage malware developed by a threat actor tracked by the company under the name ...
Edouard Bochin and Tao Yan from Palo Alto Networks have been credited with finding and reporting CVE-2025-4918. The discovery ...
While emerging risks like AI-generated malware capture headlines, the reality of today's threat landscape is more ...
Cloud-first and inherently scalable, SaaS-based platforms can deliver limitless elastic scalability that effortlessly matches ...
ITP enforces real-time policies using identity and security signals, adding preventive protection between users and apps.
BianLian and RansomExx Exploit SAP CVE-2025-31324 for Full Access, Deploy PipeMagic and Brute Ratel in Multi-Nation Attacks.