Internet intelligence firm GreyNoise has identified a significant and coordinated surge in scanning activity directed at Microsoft...
Reconnaissance
In late July 2025, a significant privacy event, dubbed the “Panama Playlists,” exposed the Spotify listening habits...
Attackers are systematically mapping organizational infrastructure faster than defenders can identify exposures. According to Censys, 80% of...
Security researchers have identified 60 malicious packages in the NPM registry that collect sensitive host and network...
Cybercriminals are now compressing attack timelines from reconnaissance to compromise to minutes rather than days, according to...
Kerberos pre-authentication brute-force attacks pose a significant risk to Active Directory environments, enabling attackers to identify valid...
Legacy configurations in Active Directory (AD) often introduce security vulnerabilities, and one of the most persistent risks...
Security teams at enterprise organizations can leverage Shodan’s command-line interface (CLI) to enhance external threat intelligence gathering....
PIP-INTEL is a Python-based Open Source Intelligence (OSINT) tool designed to streamline reconnaissance and threat intelligence workflows...
Ashok has emerged as a powerful open-source OSINT reconnaissance tool that consolidates multiple information-gathering capabilities into a...
A critical vulnerability, CVE-2025-2609, has been identified in MagnusSolution’s MagnusBilling software, a widely used billing and call...
A high-severity vulnerability, CVE-2024-9880, has been identified in the Apache Pandas library, a cornerstone of data analysis...