News

The attack chains leverage spear-phishing lures as a starting point to activate the infection process and deploy a known ...
A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, ...
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web ...
A new cryptojacking campaign dubbed RedisRaider is hijacking publicly exposed Redis servers by injecting cron jobs using ...
Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act ...
Discover findings from Pentera's 2025 State of Pentesting Report, including breach rates, alert fatigue, budget trends & the ...
Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed ...
Skitnet, also called Bossnet, is a multi-stage malware developed by a threat actor tracked by the company under the name ...
Edouard Bochin and Tao Yan from Palo Alto Networks have been credited with finding and reporting CVE-2025-4918. The discovery ...
While emerging risks like AI-generated malware capture headlines, the reality of today's threat landscape is more ...
Cloud-first and inherently scalable, SaaS-based platforms can deliver limitless elastic scalability that effortlessly matches ...
ITP enforces real-time policies using identity and security signals, adding preventive protection between users and apps.