News

Findings Indicate Nearly One-in-Three Executives Believe their CISOs Hesitate to Inform Leadership of Potential Vulnerabilities, Creating Organizational Risk FTI ...
Recent findings by Microsoft security researchers have unveiled a concerning cyberattack campaign that involves lateral movement to a cloud environment through a Microsoft SQL Server instance. While ...
The data from this study was taken from the Surfshark Alert (a data breach detection tool) database, which comprises all publicly available breached data sets to inform our users of potential threats.
The healthcare and life sciences industry continues to be plagued by cybersecurity threats. 1 According to FTI Consulting’s U.S. Healthcare & Life Sciences Industry Outlook 2023 survey, 70 percent of ...
US and global cybersecurity agencies issue a joint advisory, shedding light on the activities of a state-sponsored cyber actor called “Volt Typhoon” originating from China. The impact of Volt ...
Cisco has released critical security updates to address a high-severity DoS (Denial of Service) vulnerability that affects its IOS XR software. This vulnerability tracked as CVE-2023-20049, has a CVSS ...
A significant vulnerability has been uncovered in Samsung smartphones, linked to the Monkey’s Audio (APE) decoder. The flaw, now resolved, was identified as CVE-2024-49415, carrying a CVSS score of ...
In the ever-evolving landscape of cyber threats, a new player has emerged, signaling a significant shift in the tactics of Advanced Persistent Threat (APT) groups. Recent findings by cybersecurity ...
A brief overview of pentest frameworks and their role in assessing vulnerabilities Pentest frameworks serve as a foundation for conducting systematic and efficient penetration tests. These tools ...
An American hacker named P4x says he was behind a series of outages in North Korea’s Internet a few weeks ago. P4x told Wired he attacked North Korea in retaliation for a North Korean hacking campaign ...
Recently, cybersecurity researchers uncovered the techniques used in a sophisticated supply chain attack aimed at .NET developers. The attack employed 13 malicious NuGet packages, which impersonated ...
You can build a penetration testing lab on a raspberry pi with DVWA to test your skills and also learn new tricks on how to attack and/or secure web applications in a safe environment. The “Damn ...