Blog

Blog
Undetected Vulnerabilities in npm Packages Enable Complete System Compromise

Recent investigations have uncovered a number of malicious npm packages that contain hidden endpoints capable of wiping systems upon receiving…

Blog
Restricted Canva Creator Information Compromised Through AI Chatbot Database

A Chroma database managed by the Russian artificial intelligence chatbot startup My Jedai has been discovered exposed on the internet,…

Blog
Security Vulnerability in PayU Plugin Facilitates Account Takeover on 5,000 WordPress Sites

A critical vulnerability in the PayU CommercePro plugin has exposed thousands of WordPress sites to risks from unauthenticated attackers capable…

Blog
Over 70 Organizations Across Diverse Sectors Compromised by China-Associated Cyber Espionage Threat Actor

The reconnaissance activity targeting a prominent cybersecurity firm, SentinelOne, forms part of a larger strategy of interconnected intrusions directed at…

Blog
Evaluating the Limitations of Your IdP or CASB: Five Critical Risks Associated with Shadow IT

Organizations often overlook the risks of shadow IT, which do not require internal sabotage to lead to data breaches. Situations…

Blog
Trump Administration Updates Cybersecurity Regulations, Supersedes Previous Directive

US President Donald Trump has issued a new cybersecurity-related Executive Order, which supersedes prior directives issued by past administrations. This…