Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
ThreatsDay roundup covering stealthy attacks, phishing trends, exploit chains, and rising security risks across the threat landscape.
The information was stolen from a marketing tool after an employee fell victim to a targeted phone phishing attack.
Password resets are often weaker than login security, making them a prime target for privilege escalation. Specops Software explains how attackers abuse reset workflows and how to secure them.
The very British history of Ben Harris is a mischievous youngster who tinkered with school networks, evolved through legitimate pentesting and became the founder and CEO of WatchTowr. The WatchTowr platform builds a real-time attack view of its customers’ environments and continuously identifies ...
Insufficient sanitization of CSS content within HTML emails leads to inline script execution when the message is opened in a browser.
Ubiquiti has patched two vulnerabilities in the UniFi Network Application, including a maximum-severity flaw that may allow attackers to take over user accounts.
Perseus Android malware uses accessibility abuse via phishing apps to enable device takeover and financial fraud across multiple countries.
View CSAF