What is External Attack Surface Management
Imagine trying to guard your home without knowing how many doors and windows it has, let alone which ones are unlocked. That’s the challenge many organizations face with their digitalRead More →
Imagine trying to guard your home without knowing how many doors and windows it has, let alone which ones are unlocked. That’s the challenge many organizations face with their digitalRead More →
In December 2024, Arctic Wolf Labs uncovered a targeted campaign exploiting Fortinet FortiGate firewalls via publicly exposed management interfaces. This campaign enabled threat actors to gain unauthorized access, alter configurations,Read More →
A new zero-click vulnerability, CVE-2024-49415, has been uncovered by a Google Project Zero researcher, highlighting a critical flaw in Samsung’s implementation of Rich Communication Services (RCS). This vulnerability, with aRead More →
In a move aimed at bolstering consumer cybersecurity, the Federal Communications Commission (FCC) has introduced the U.S. Cyber Trust Mark program. This voluntary initiative focuses on helping consumers identify InternetRead More →
MediaTek’s January 2025 Product Security Bulletin has highlighted a critical Remote Code Execution (RCE) vulnerability, identified as CVE-2024-20154, which affects millions of devices using MediaTek chipsets. This vulnerability is presentRead More →
The LDAPNightmare Proof-of-Concept (PoC) exploit, leveraging the critical vulnerability CVE-2024-49113, has brought to light serious weaknesses in Windows Server environments. This vulnerability targets the Local Security Authority Subsystem Service (LSASS),Read More →
Recent advancements in research and live demonstrations have brought to light a critical vulnerability in Microsoft’s BitLocker encryption technology, widely used to safeguard sensitive data. The vulnerability, tracked as CVE-2023-21563Read More →
Palo Alto Networks has released a critical security patch to address a recently identified vulnerability in its PAN-OS operating system, widely used in its firewall and network security appliances. TheRead More →
Fortinet’s FortiGuard Labs has recently uncovered two highly malicious Python packages, Zebo-0.1.0 and Cometlogger-0.1, which serve as a sobering reminder of the evolving sophistication of cyber threats. These packages, discoveredRead More →
Researchers from the University of the West Indies have uncovered critical vulnerabilities in the Wi-Fi Protected Access 3 (WPA3) protocol, exposing potential risks to networks believed to be highly secure.Read More →
Sophos, a global leader in cybersecurity, has disclosed three critical vulnerabilities in its Sophos Firewall product, warning that these flaws could be exploited by remote, unauthenticated threat actors to compromiseRead More →
In a new cyber threat exploiting ZIP file concatenation, attackers use a Trojan embedded in concatenated ZIP files to target Windows users, evading standard detection methods. This technique takes advantageRead More →
In a recent report, Unit 42 cybersecurity researchers from Palo Alto Networks have uncovered a sophisticated method called “Deceptive Delight,” highlighting the vulnerabilities of Large Language Models (LLMs) to targetedRead More →
A recent investigation has uncovered a series of sophisticated cyber-attacks by the Advanced Persistent Threat (APT) group known as GoldenJackal, which successfully breached air-gapped government systems in Europe. These isolatedRead More →
Workplace safety is a growing concern for businesses across Texas, especially in major hubs like Dallas and Houston. With bustling corporate centers, dynamic retail spaces, and vast industrial facilities, theseRead More →
A critical vulnerability, identified as CVE-2024-0132, has been discovered in NVIDIA’s AI infrastructure, affecting over 35% of cloud environments utilizing NVIDIA GPUs. This vulnerability targets the NVIDIA Container Toolkit andRead More →
In what appears to be a highly sophisticated cyber-physical operation targeting Hezbollah, new revelations have emerged about the potential involvement of Israel’s elite cyber intelligence unit, Unit 8200, in aRead More →
Ransomware groups are increasingly adopting new strategies for data exfiltration, with recent evidence pointing to the use of Microsoft’s Azure Storage Explorer for large-scale data theft. The trend, observed byRead More →
In recent years, there have been increasing amounts of cybersecurity threats that continue to evolve and pose risks to consumers. Bring real-time ransomware detection to your cybersecurity stack to helpRead More →
Microsoft SmartScreen Overview: Microsoft SmartScreen is a cloud-based anti-phishing and anti-malware component that comes integrated with various Microsoft products like Microsoft Edge, Internet Explorer, and Windows. It is designed toRead More →