cyber security
Microsoft Unveils New Identity Secure Score Recommendations in General Availability
Microsoft has announced the general availability of 11 new Identity Secure Score recommendations in Microsoft Entra, aimed at bolstering organizational security and providing actionable insights to mitigate risks.The...
cyber security
New Cookie Sandwich Technique Allows Stealing of HttpOnly cookies
A new attack technique known as the "cookie sandwich" has surfaced, raising significant concerns among cybersecurity professionals.This technique enables attackers to bypass the HttpOnly...
cyber security
The Growing Role of AI-Powered SAST in the Developer Toolkit
In today’s app dev world, where new apps and millions of lines of code are being deployed every day, the need for fast and...
cyber security
New Contacto Ransomware Evades AV Detection & Uses Windows Console for Execution
In early January 2025, a new ransomware strain identified as Contacto surfaced, showcasing advanced techniques designed to bypass conventional security measures.This analysis provides...
cyber security
Google’s “Sign in with Google” Flaw Exposes Millions of Users’ Details
A critical flaw in Google's "Sign in with Google" authentication system has left millions of Americans vulnerable to potential data theft.This vulnerability mainly...
cyber security
Hackers Attacking Internet Connected Fortinet Firewalls Using Zero-Day Vulnerability
A widespread campaign targeting Fortinet FortiGate firewall devices with exposed management interfaces on the public internet.The attacks, observed by Arctic Wolf between November...
cyber security
PriveShield – Advanced Privacy Protection with Browser Profile Isolation
A browser extension named PRIVESHIELD automatically creates isolated profiles to group websites based on browsing history and user interaction, which disrupts cross-website tracking practices...
cyber security
Hackers Brute Force Your Passwords?
Cybercrimes have always existed as a result of internet usage in our society. Traversing the wide web, hackers are trying to exploit any nooks...
cyber security
Lumma Stealer Attacking Users To Steal Login Credentials From Browsers
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised EXE installer, as analysis revealed a parent-child relationship between...
cyber security
NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern
The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in the cybersecurity community.This notorious Remote Access Trojan (RAT),...
cyber security
Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks
A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto Networks' PAN-OS software.This flaw allows unauthenticated attackers to...