Blog

Blog
Exploitation of New Fortinet and Ivanti Zero-Day Vulnerabilities Detected in the Wild

Fortinet and Ivanti have issued urgent alerts regarding the exploitation of new zero-day vulnerabilities affecting a variety of their products….

Blog
Apple Agrees to Settlement of $95 Million in Siri Surveillance Litigation – Application Details Enclosed

Apple has agreed to pay $95 million to settle allegations regarding unauthorized recordings made by Siri, its voice-activated assistant. This…

Blog
Earth Ammit Compromises Drone Supply Chains through ERP Vulnerabilities in VENOM and TIDRONE Campaigns

A cyber espionage group identified as Earth Ammit is linked to two distinct campaigns targeting various sectors in Taiwan and…

Blog
Emerging ‘Chihuahua Stealer’ Malware Compromises Browser Data and Cryptocurrency Wallets

A new infostealer, identified as “Chihuahua Stealer,” combines traditional malware tactics with advanced functionalities, raising concerns within the cybersecurity community….

Blog
The Advantages of Offensive Security Training for Enhancing Your Security Team’s Effectiveness

Organizations across various sectors are witnessing a striking increase in cyberattacks, particularly those targeting critical infrastructure and cloud-based enterprises. The…

Blog
Horabot Malware Exploits Invoice-Themed Phishing Campaigns Across Six Latin American Countries

Cybersecurity researchers have identified a sophisticated phishing campaign distributing a malware variant known as Horabot, specifically targeting Windows users across…