radar

ONE Sentinel

article

All Articles

THIS MONTH

Browse all curated articles across categories

689 articles
security

CRITICAL: CISA flags VMware Aria Operations RCE flaw as exploited in attacks

CRIT

CISA Alerts on Exploited VMware Aria Operations RCE Vulnerability

Bleeping ComputerTHREATS26d
security

Signed malware impersonating workplace apps deploys RMM backdoors

HIGH

Signed Malware Uses Stolen EV Certificate to Deploy RMM Backdoors

Microsoft Security BlogM36526d
security

Facebook accounts unavailable in worldwide outage

Global Facebook Outage Leaves Users Locked Out of Accounts

Bleeping ComputerTHREATS26d
security

Microsoft: Hackers abuse OAuth error flows to spread malware

HIGH

Hackers Exploit OAuth Error Flows to Spread Malware, Microsoft Warns

Bleeping ComputerTHREATS26d
security

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

HIGH

Fake IT Support Scam Deploys Havoc C2 Framework for Cyber Attacks

The Hacker NewsTHREATS26d
security

Google Chrome shifts to two-week release cycle for increased stability

Google Chrome Accelerates Release Cycle for Enhanced Stability

Bleeping ComputerTHREATS26d
security

Compromised Site Management Panels are a Hot Item in Cybercrime Markets

HIGH

Underground Markets Thrive on Compromised cPanel Credentials

Bleeping ComputerTHREATS26d
security

LexisNexis confirms data breach as hackers leak stolen files

HIGH

LexisNexis Data Breach Exposes Customer Information

Bleeping ComputerTHREATS26d
security

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

HIGH

AI-Driven Attacks Exploit FortiGate Appliances in 55 Countries

The Hacker NewsTHREATS26d
security

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

Enhancing Tier 1 SOC Performance: A CISO's Guide

The Hacker NewsTHREATS26d
security

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

HIGH

Starkiller Phishing Suite Evades MFA with Advanced Proxy Tactics

The Hacker NewsTHREATS26d
security

AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged

AI Agents: Unseen Forces Transforming Enterprise Workflows

The Hacker NewsTHREATS26d