News
How the OODA loop can be applied to prevent and mitigate shadow AI and help organizations respond to shadow AI challenges.
Interview with John Kindervag, best known for developing the Zero Trust Model in 2009 while principal analyst at Forrester ...
Misconfigured Apache Pinot instances can and have enabled threat actors to gain access to sensitive information.
Threat actors are revisiting SAP NetWeaver instances to leverage webshells deployed via a recent zero-day vulnerability.
Rami Khaled Ahmed, a 36-year-old from Yemen, has been charged for launching ransomware attacks between 2021 and 2023.
Threat actors started exploiting a vulnerability in Samsung MagicINFO only days after a PoC exploit was published.
CISA warns organizations that threat actors are exploiting a critical-severity vulnerability in low-code AI builder Langflow.
More than thirty cybersecurity merger and acquisition (M&A) deals were announced in April 2025. An analysis conducted by ...
The proposed $491 million cut is being positioned as a “refocusing”of CISA on its core mission “while eliminating ...
A 25-year-old has admitted hacking Disney systems and leaking data under the guise of a hacktivist collective named NullBulge ...
PoC code targeting two exploited SonicWall vulnerabilities was published just CISA added them to the KEV catalog.
The DragonForce ransomware group has claimed responsibility for the recent cyberattacks on UK retailers Co-op, Harrods, and M ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results