radar

ONE Sentinel

security

Security & Cyber

LIVE

Vulnerabilities, threat intelligence, and security advisories

685 articles
|
security

Microsoft brings phishing-resistant Windows sign-ins via Entra passkeys

HIGH

Microsoft Enhances Windows Security with Phishing-Resistant Entra Passkeys

Bleeping ComputerTHREATS20d
security

New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

HIGH

LeakyLooker Flaws in Google Looker Studio Pose Cross-Tenant SQL Threat

The Hacker NewsTHREATS20d
security

The New Turing Test: How Threats Use Geometry to Prove 'Humanness'

HIGH

Malware Adopts Geometry to Outsmart Sandboxes

Bleeping ComputerTHREATS20d
security

The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

HIGH

Mitigating Zero-Day Vulnerabilities Through Attack Surface Reduction

The Hacker NewsTHREATS20d
security

How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

HIGH

AI Agents: The New 'Invisible Employee' and Their Security Risks

The Hacker NewsTHREATS20d
security

CISA: Recently patched Ivanti EPM flaw now actively exploited

HIGH

Ivanti EPM Vulnerability Under Active Exploitation, CISA Urges Immediate Patching

Bleeping ComputerTHREATS20d
security

APT28 hackers deploy customized variant of Covenant open-source tool

HIGH

APT28 Utilizes Customized Covenant Framework for Espionage

Bleeping ComputerTHREATS20d
security

Microsoft to enable Windows hotpatch security updates by default

Microsoft to Default Hotpatch Security Updates for Windows in 2026

Bleeping ComputerTHREATS20d
security

CRITICAL: CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

CRIT

CISA Identifies Active Exploitation in SolarWinds, Ivanti, and Workspace One Vulnerabilities

The Hacker NewsTHREATS21d
security

Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

HIGH

Salesforce Experience Cloud Targeted by Threat Actors Using Modified AuraInspector

The Hacker NewsTHREATS21d
security

Google: Cloud attacks exploit flaws more than weak credentials

HIGH

Cloud Security Threats: Vulnerabilities Overtake Weak Credentials

Bleeping ComputerTHREATS21d
security

Microsoft Teams phishing targets employees with backdoors

HIGH

Microsoft Teams Phishing Attack Deploys A0Backdoor via Quick Assist

Bleeping ComputerTHREATS21d

Showing 253-264 of 685 articles