Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
The high- and medium-severity flaws could lead to denial-of-service, secure boot bypass, information disclosure, and privilege escalation.
Third-party resellers and brokers foil transparency efforts and allow spyware to spread despite government restrictions, a study finds.
View CSAF
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface, leading to full compromise of the device.
81% of attacks are malware-free as AI-driven mimicry hides threats in trusted systems, increasing detection difficulty and risk.
An Armenian suspect was extradited to the United States to face criminal charges for allegedly helping manage RedLine, one of the most prolific infostealer malware operations in recent years.
ThreatsDay Bulletin covers stealthy attack trends, evolving phishing tactics, supply chain risks, and how familiar tools are being quietly abused.
A disgruntled data analyst decides that the best response to losing his contract is to steal the entire company payroll database and demand $2.5…
Validate your security posture with real attacker behavior using continuous, CTI-driven testing to uncover gaps and prove defenses work.
Coruna reuses Triangulation kernel exploits targeting iOS 13–17.2.1 devices, expanding attacks into mass exploitation campaigns.