News
The attack chains leverage spear-phishing lures as a starting point to activate the infection process and deploy a known ...
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web ...
A new cryptojacking campaign dubbed RedisRaider is hijacking publicly exposed Redis servers by injecting cron jobs using ...
A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, ...
Discover findings from Pentera's 2025 State of Pentesting Report, including breach rates, alert fatigue, budget trends & the ...
Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act ...
Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed ...
Skitnet, also called Bossnet, is a multi-stage malware developed by a threat actor tracked by the company under the name ...
Edouard Bochin and Tao Yan from Palo Alto Networks have been credited with finding and reporting CVE-2025-4918. The discovery ...
CTEM adoption in 2025 improves risk visibility and enables 3x breach reduction by 2026 via real-time validation.
While emerging risks like AI-generated malware capture headlines, the reality of today's threat landscape is more ...
Cloud-first and inherently scalable, SaaS-based platforms can deliver limitless elastic scalability that effortlessly matches ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results