The 2024 MITRE ATT&CK® Evaluations for Enterprise reveal critical insights into ransomware and macOS threats, with vendors...
Red Team
Security teams now have access to a powerful new open-source tool for analyzing binary security posture. Extrude...
Ashok has emerged as a powerful open-source OSINT reconnaissance tool that consolidates multiple information-gathering capabilities into a...
A new tool called Imperius has emerged, designed to detect and expose Linux Kernel Module (LKM) rootkits...
Internal and external penetration testing (pentesting) are critical components for evaluating an organization’s security posture. These simulated...
In an era of evolving cyber threats, organizations are adopting realistic methods to test their defenses. Red...
The global outage caused by a faulty update from CrowdStrike has led to significant disruptions for organizations...
The National Cyber Security Centre (NCSC) and the Digital Trust Center (DTC) have recently issued a warning...
TL;DR Malicious macros remain a significant threat, with Microsoft Office being a common attack vector. Updated guidance...
The National Cyber Security Centre (NCSC) has issued a warning about the increasing use of malicious software...
Lateral movement is a technique used by attackers to navigate through a network after gaining initial access....
The UK’s National Cyber Security Centre (NCSC) is taking a significant step forward in cybersecurity certification with...
A critical Server-Side Request Forgery (SSRF) vulnerability (CVE-2025-2691) has been identified in the nossrf package, affecting versions...
A critical vulnerability, CVE-2025-2609, has been identified in MagnusSolution’s MagnusBilling software, a widely used billing and call...
A high-severity vulnerability, CVE-2024-9880, has been identified in the Apache Pandas library, a cornerstone of data analysis...