Attack

What Is the Impact of the Largest 29.7 Tbps DDoS Attack?
Malware & Threats What Is the Impact of the Largest 29.7 Tbps DDoS Attack?

In an era where digital infrastructure underpins nearly every facet of life, a staggering event has shaken the foundations of cybersecurity: a distributed denial-of-service (DDoS) attack clocking in at an unprecedented 29.7 terabits per second (Tbps). This colossal assault, lasting a mere 69

How Did SmartTube's Security Breach Affect Android TV Users?
Data Protection & Privacy How Did SmartTube's Security Breach Affect Android TV Users?

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with a wealth of experience in endpoint and device security, cybersecurity strategies, and network management. Today, we're diving into the recent SmartTube breach—a significant incident that compromised a popular

Will ScadaBR XSS in CISA’s KEV Fuel Cloud-Scale ICS Attacks?
Malware & Threats Will ScadaBR XSS in CISA’s KEV Fuel Cloud-Scale ICS Attacks?

KEV Meets the Plant Network: Why a ScadaBR XSS Entry Changes the Risk Calculus Now When a settings page on a familiar HMI can deliver scripted deception, disable alarms, and rewrite operator assumptions in a single click, the debate about “web-only” risk in industrial networks stops sounding

Okta Study: Phishing Persists Despite Advanced Defenses
Malware & Threats Okta Study: Phishing Persists Despite Advanced Defenses

Lead Monthaftermonththecountofenterprisestrippedbyphishingneverhitszeroeveninmatureprograms. Even as authentication hardens and detection stacks converge, attackers keep finding ways to coax users into handing over what tech alone cannot fully guard: trust. The result is a steady pulse of

ShadowRay 2.0 Vulnerability – Review
Malware & Threats ShadowRay 2.0 Vulnerability – Review

In a landscape where artificial intelligence drives innovation across industries, a staggering statistic emerges: nearly 230,000 Ray framework environments are exposed to the internet, ripe for exploitation. This open-source tool, pivotal for orchestrating AI workloads, has become a prime target

How Did Hackers Target Salesforce via Gainsight Apps?
Malware & Threats How Did Hackers Target Salesforce via Gainsight Apps?

In an alarming development within the cybersecurity landscape, a sophisticated hacking campaign has emerged, targeting customer environments of Salesforce, a dominant force in cloud-based software solutions, through applications developed by Gainsight, a company known for its customer success

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later