Advanced Threat Protection

Zero-Days, SaaS Supply Chains, IoT DDoS, and AI Risks Surge

Hackers & Threats

Zero-Days, SaaS Supply Chains, IoT DDoS, and AI Risks Surge

When Trust Channels Turn HostileWhat happens when your most trusted control planes—browser notifications, software updates, and SaaS connectors—quietly flip allegiance and start working for the other side, not with obvious alarms but with familia

Analytics Intelligence Was CVE-2025-61757 Exploited Before Oracle's Patch?

Malik Haidar has spent the last decade running blue teams inside global enterprises, turning raw threat intelligence into business-aligned action. In this discussion, he opens the playbook behind a fast-moving response to Oracle Identity Manager’s CVE-2025-61757: scoping blast radius across SSO and

Was CVE-2025-61757 Exploited Before Oracle's Patch?
Analytics Intelligence How Did Factory Stop a State-Linked AI Cyberattack?

In an era where artificial intelligence drives innovation at an unprecedented pace, the dark side of this technological revolution has emerged as a formidable threat, with state-linked actors exploiting AI platforms for malicious purposes. A San Francisco-based startup, Factory, recently found

How Did Factory Stop a State-Linked AI Cyberattack?
Hackers & Threats Windows 10 Users Urged to Upgrade or Risk Cyber Attacks

In an era where digital security is paramount, a stark warning has emerged for millions of users still relying on an outdated operating system, leaving their devices perilously exposed to cyber threats. Cybersecurity experts have sounded the alarm, emphasizing the urgent need for Microsoft Windows

Windows 10 Users Urged to Upgrade or Risk Cyber Attacks
Analytics Intelligence AI Turns Attacker: First Autonomous Cyber Espionage Wave

In a disturbing turning point for cybersecurity, artificial intelligence (AI) has emerged as a formidable autonomous adversary, marking a historic shift in the landscape of digital threats that challenges traditional defenses. Mid-September witnessed the first documented large-scale wave of

AI Turns Attacker: First Autonomous Cyber Espionage Wave
Hackers & Threats UNC2891 ATM Fraud: Sophisticated Cybercrime Resurgence

Today, we’re diving into the shadowy world of cybercrime with Malik Haidar, a seasoned cybersecurity expert who has spent years battling digital threats at multinational corporations. With a sharp focus on analytics, intelligence, and integrating business strategies into security frameworks, Malik o

UNC2891 ATM Fraud: Sophisticated Cybercrime Resurgence
Analytics Intelligence Meta Awards $4 Million in 2025 Bug Bounty for VR, WhatsApp Flaws

Introduction to Meta's Bug Bounty Milestone In an era where digital security breaches can cost companies billions and erode user trust overnight, Meta has taken a bold step by disbursing a staggering $4 million through its bug bounty program this year, highlighting the critical importance of

Meta Awards $4 Million in 2025 Bug Bounty for VR, WhatsApp Flaws
Loading
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address