Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes
Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your…
Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your…
Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability…
Fortinet, Ivanti, and SAP have moved to address critical security flaws in their products that, if successfully exploited, could result…
Ransomware actors have targeted manufacturers, retailers, and the Japanese government, with many organizations requiring months to recover.
Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This…
Proof-of-concept exploit code is publicly available for two other flaws in this month’s Patch Tuesday. In total, the company issued…
Shanya is the latest in an emerging field of packing malware, selling obfuscation functionality in order to help ransomware actors…
Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical React2Shell security…
Think “Blade Runner,” but the robots can be hacked more easily than your home computer.
Four distinct threat activity clusters have been observed leveraging a malware loader known as CastleLoader, strengthening the previous assessment that…