A New Tool Blocks Imposter Attacks Disguised as Safe Commands In the realm of cybersecurity, a groundbreaking open-source and cross-platform tool known as Tirith has emerged....
In today’s digital landscape, the browser has become the central hub for enterprise work. With a multitude of SaaS applications, identity providers, admin consoles, and AI...
Russian Hackers Exploit Recently Patched Microsoft Office Bug Reports from Ukraine’s Computer Emergency Response Team (CERT) reveal that Russian hackers are taking advantage of CVE-2026-21509, a...
Browser-based attacks are a significant threat that many organizations face, with 95% of enterprises experiencing such attacks last year. These attacks often go unnoticed by traditional...
When it comes to cybersecurity, one thing remains constant: adversaries are always evolving. The emergence of offensive AI is revolutionizing attack techniques, making them more difficult...
The Rise of Voice Phishing Attacks Targeting SSO Accounts In recent times, the ShinyHunters extortion gang has claimed responsibility for a series of voice phishing attacks...
Taiwan’s Energy Sector Faces Tenfold Increase in Cyberattacks from China In a recent report by Taiwan’s National Security Bureau, it was revealed that China’s cyberattacks on...
The Rise of AI-Powered Password Attacks in Active Directory In today’s digital landscape, Active Directory remains a cornerstone for managing user identities in most organizations. Unfortunately,...
Over 10,000 Fortinet Firewalls Still Vulnerable to Critical 2FA Bypass Vulnerability Fortinet firewalls are at risk as over 10,000 devices remain exposed and vulnerable to attacks...
Former Cybersecurity Firm Employees Plead Guilty to Ransomware Attacks In a recent development, two individuals with prior experience at cybersecurity firms have admitted to orchestrating a...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.