Stellar Cyber: A Year in Review
Stepping into 2024, Open XDR innovator Stellar Cyber is reflecting on 2023. Stellar Cyber’s CEO and Co-Founder, Changming Liu, writes: “Going into 2023, we had four clear objectives: Let’s breakRead More →
Stepping into 2024, Open XDR innovator Stellar Cyber is reflecting on 2023. Stellar Cyber’s CEO and Co-Founder, Changming Liu, writes: “Going into 2023, we had four clear objectives: Let’s breakRead More →
Recently, there has been an emergence of a new scam targeting victims of ransomware attacks. This scam involves individuals or groups posing as “security researchers” or “ethical hackers,” offering toRead More →
In the rapidly evolving landscape of artificial intelligence, generative AI systems have become a cornerstone of innovation, driving advancements in fields ranging from language processing to creative content generation. However,Read More →
In 2023, we’ve made an immense contribution to cybersecurity. Artificial Intelligence is an excellent tool for managing security and protecting systems, but it can do considerable damage in the wrongRead More →
It’s a tough world out there – and businesses know it better than anyone. While it takes only a few steps to launch a venture, ensuring it lasts is theRead More →
A recent investigation by Unit 42 of Palo Alto Networks has uncovered a dual privilege escalation chain in Google Kubernetes Engine (GKE). This vulnerability, stemming from specific configurations in GKE’sRead More →
SMTP stands for Simple Mail Transfer Protocol. It’s a protocol used for sending emails across the Internet. SMTP operates on a push model, where the sending server pushes the emailRead More →
CVE-2023-35628 is a critical remote code execution (RCE) vulnerability affecting the Microsoft Windows MSHTML platform, with a Common Vulnerability Scoring System (CVSS) score of 8.1, indicating a high level ofRead More →
Recent cybersecurity research has unveiled a critical vulnerability impacting over 1,450 pfSense servers, exposing them to potential remote code execution (RCE) attacks. This vulnerability arises from a combination of commandRead More →
In the ever-evolving landscape of cybersecurity, researchers are continually uncovering new methods that challenge existing defense mechanisms. A recent study by SafeBreach, a leader in cybersecurity research, has brought toRead More →