No menu items!
No menu items!
More

    THN

    Why top SOC teams are shifting to Network Detection and Response

    Security Operations Center (SOC) teams are facing a fundamentally new challenge — traditional cybersecurity tools are failing to detect advanced adversaries who have...

    95% of AppSec Fixes Don’t Reduce Risk

    For over a decade, application security teams have faced a brutal irony: the more advanced the detection tools became, the less useful their...

    Commvault Confirms Hackers Exploited CVE-2025-3928 as Zero-Day in Azure Breach

    May 01, 2025Ravie LakshmananZero-Day / Threat Intelligence Enterprise data backup platform Commvault has revealed that an unknown nation-state threat actor breached its Microsoft Azure...

    SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models

    May 01, 2025Ravie LakshmananVulnerability / VPN Security SonicWall has revealed that two now-patched security flaws impacting its SMA100 Secure Mobile Access (SMA) appliances have...

    Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks

    Apr 30, 2025Ravie LakshmananThreat Intelligence / Malware Cybersecurity researchers have shed light on a Russian-speaking cyber espionage group called Nebulous Mantis that has deployed...

    Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense

    Apr 30, 2025Ravie LakshmananArtificial Intelligence / Email Security As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research...

    Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool

    Apr 30, 2025Ravie LakshmananMalware / DNS Security A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral movement tool...

    [Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

    Apr 30, 2025The Hacker News How Many Gaps Are Hiding in Your Identity System? It's not just about logins anymore. Today's attackers don't need to...

    The Multi-Billion Dollar Problem You Don’t Know About

    Everyone has cybersecurity stories involving family members. Here's a relatively common one. The conversation usually goes something like this: "The strangest thing happened...

    Latest articles

    spot_imgspot_img