radar

ONE Sentinel

article

All Articles

THIS MONTH

Browse all curated articles across categories

208 articles
security

FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

HIGH

FortiGate Firewalls Exploited in Credential Theft Campaign

The Hacker NewsTHREATS19d
security

Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws

HIGH

Microsoft March 2026 Patch Tuesday Addresses 2 Zero-Days and 79 Vulnerabilities

Bleeping ComputerTHREATS19d
security

KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet

HIGH

KadNap Malware Hijacks Over 14,000 Asus Routers for Botnet Operations

The Hacker NewsTHREATS19d
security

New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network

HIGH

KadNap Botnet Exploits ASUS Routers for Cybercrime Proxy Network

Bleeping ComputerTHREATS19d
security

Microsoft brings phishing-resistant Windows sign-ins via Entra passkeys

HIGH

Microsoft Enhances Windows Security with Phishing-Resistant Entra Passkeys

Bleeping ComputerTHREATS19d
security

New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

HIGH

LeakyLooker Flaws in Google Looker Studio Pose Cross-Tenant SQL Threat

The Hacker NewsTHREATS19d
security

The New Turing Test: How Threats Use Geometry to Prove 'Humanness'

HIGH

Malware Adopts Geometry to Outsmart Sandboxes

Bleeping ComputerTHREATS19d
security

The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

HIGH

Mitigating Zero-Day Vulnerabilities Through Attack Surface Reduction

The Hacker NewsTHREATS20d
security

How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

HIGH

AI Agents: The New 'Invisible Employee' and Their Security Risks

The Hacker NewsTHREATS20d
security

CISA: Recently patched Ivanti EPM flaw now actively exploited

HIGH

Ivanti EPM Vulnerability Under Active Exploitation, CISA Urges Immediate Patching

Bleeping ComputerTHREATS20d
security

APT28 hackers deploy customized variant of Covenant open-source tool

HIGH

APT28 Utilizes Customized Covenant Framework for Espionage

Bleeping ComputerTHREATS20d
security

Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

HIGH

Salesforce Experience Cloud Targeted by Threat Actors Using Modified AuraInspector

The Hacker NewsTHREATS20d