Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
View CSAF
From service accounts to AI-driven processes, identity is evolving faster than most security programs can adapt. Discover strategies for reducing risk and regaining control.
ThreatsDay Bulletin: fake apps, supply chain attacks, AI-fueled exploits, ransomware chaos, and the biggest cyber threats this week.
Successful exploitation of the flaws could lead to code execution, server-side request forgery attacks, and denial-of-service conditions.
Palo Alto Networks warned customers that suspected state-sponsored hackers have been exploiting a critical-severity PAN-OS firewall zero-day vulnerability for nearly a month.
Delayed IR access and 14-day logs limit visibility during breaches, increasing attacker dwell time and recovery costs.
Attackers could inject prompts into a GitHub issue and take over the AI agent designed to automatically triage the issue.
A fake version for the Claude AI website offers a malicious Claude-Pro Relay download that pushes a previously undocumented backdoor for Windows named Beagle.
ZiChatBot malware spread via 3 PyPI packages in July 2025 uses Zulip APIs as C2, enabling stealthy attacks across systems
Dragos has published a report describing how threat actors used Claude AI in an attack on a water and drainage utility in Mexico.
12 vm2 flaws (CVSS up to 10.0) enable sandbox escape in ≤3.11.1, causing remote code execution risk; patched in 3.11.2.
No description available.