News
Three critical Versa Concerto flaws disclosed after 90 days allow remote code execution via reverse proxy misconfigurations.
52% of breaches stem from manual identity workflows in disconnected apps—causing customer loss and compliance risks.
UNC5221 exploited Ivanti EPMM flaws CVE-2025-4427/4428 in global attacks starting May 15, 2025, enabling remote access and ...
Microsoft and Europol dismantled Lumma’s 2,300-domain C2 network after 10M infections tied to credential and crypto theft.
APT28 targets NATO-aligned logistics and tech firms via malware, phishing, and 7 CVEs to spy on Ukraine aid routes.
The original executable that launches "ckcfb.exe" simultaneously also extracts a second binary referred to as "StilKrip.exe," ...
Fake Facebook ads impersonating Kling AI deploy PureHVNC RAT via spoofed sites, stealing credentials and crypto data.
A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, ...
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web ...
The attack chains leverage spear-phishing lures as a starting point to activate the infection process and deploy a known ...
Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed ...
Discover findings from Pentera's 2025 State of Pentesting Report, including breach rates, alert fatigue, budget trends & the ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results