All Articles
THIS MONTHBrowse all curated articles across categories
New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries
HIGHLeakyLooker Flaws in Google Looker Studio Pose Cross-Tenant SQL Threat
The New Turing Test: How Threats Use Geometry to Prove 'Humanness'
HIGHMalware Adopts Geometry to Outsmart Sandboxes
The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction
HIGHMitigating Zero-Day Vulnerabilities Through Attack Surface Reduction
How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows
HIGHAI Agents: The New 'Invisible Employee' and Their Security Risks
CISA: Recently patched Ivanti EPM flaw now actively exploited
HIGHIvanti EPM Vulnerability Under Active Exploitation, CISA Urges Immediate Patching
APT28 hackers deploy customized variant of Covenant open-source tool
HIGHAPT28 Utilizes Customized Covenant Framework for Espionage
Microsoft to enable Windows hotpatch security updates by default
Microsoft to Default Hotpatch Security Updates for Windows in 2026
CRITICAL: CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
CRITCISA Identifies Active Exploitation in SolarWinds, Ivanti, and Workspace One Vulnerabilities
Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
HIGHSalesforce Experience Cloud Targeted by Threat Actors Using Modified AuraInspector
Google: Cloud attacks exploit flaws more than weak credentials
HIGHCloud Security Threats: Vulnerabilities Overtake Weak Credentials
Microsoft Teams phishing targets employees with backdoors
HIGHMicrosoft Teams Phishing Attack Deploys A0Backdoor via Quick Assist
Ericsson US discloses data breach after service provider hack
HIGHEricsson US Faces Data Breach After Service Provider Hack