News

Discover findings from Pentera's 2025 State of Pentesting Report, including breach rates, alert fatigue, budget trends & the ...
Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed ...
A new cryptojacking campaign dubbed RedisRaider is hijacking publicly exposed Redis servers by injecting cron jobs using ...
Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act ...
Skitnet, also called Bossnet, is a multi-stage malware developed by a threat actor tracked by the company under the name ...
ITP enforces real-time policies using identity and security signals, adding preventive protection between users and apps.
Edouard Bochin and Tao Yan from Palo Alto Networks have been credited with finding and reporting CVE-2025-4918. The discovery ...
While emerging risks like AI-generated malware capture headlines, the reality of today's threat landscape is more ...
Cloud-first and inherently scalable, SaaS-based platforms can deliver limitless elastic scalability that effortlessly matches ...
HTTPBot, first spotted in the wild in August 2024, gets its name from the use of HTTP protocols to launch distributed denial-of-service attacks. Written in Golang, it's something of an anomaly given ...
AI classification, zero trust, and centralized DLP drive stronger data protection and compliance in dynamic environments.
The hardware exploits, tracked as CVE-2024-28956 and CVE-2025-24495, can be used against Intel CPUs to leak kernel memory at ...