All Articles
THIS MONTHBrowse all curated articles across categories
54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security
HIGH54 EDR Killers Exploit Vulnerable Drivers to Disable Security
Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
HIGHSpeagle Malware Exploits Cobra DocGuard to Steal Sensitive Data
CRITICAL: New ‘PolyShell’ flaw allows unauthenticated RCE on Magento e-stores
CRITCritical 'PolyShell' Flaw Threatens Magento E-Stores with RCE
Navia discloses data breach impacting 2.7 million people
HIGHNavia Data Breach Exposes Sensitive Information of 2.7 Million Individuals
Bitrefill blames North Korean Lazarus group for cyberattack
HIGHBitrefill Cyberattack Linked to North Korean Lazarus Group
When tax season becomes cyberattack season: Phishing and malware campaigns using tax-related lures
HIGHTax Season Sparks Surge in Phishing and Malware Attacks
CRITICAL: FBI seizes Handala data leak site after Stryker cyberattack
CRITFBI Seizes Handala Leak Sites After Major Stryker Cyberattack
CRITICAL: New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data
CRITPerseus Malware Targets Android Devices for Financial Fraud
7 Ways to Prevent Privilege Escalation via Password Resets
HIGHStrengthen Password Reset Protocols to Prevent Privilege Escalation
Russian hackers exploit Zimbra flaw in Ukrainian govt attacks
HIGHRussian APT28 Exploits Zimbra Flaw in Ukrainian Government Cyberattacks
How Ceros Gives Security Teams Visibility and Control in Claude Code
Claude Code: The New Actor in Enterprise Security Landscape
CRITICAL: CISA urges US orgs to secure Microsoft Intune systems after Stryker breach
CRITCISA Alerts on Microsoft Intune Vulnerability Following Stryker Breach