Featured news
The Challenges of DIY Botnet Detection – and How to Overcome...
Botnets have been around for over two decades, and with the rise of the Internet of Things (IoT) they have spread further to devices...
Tech News
Tech
Wave of ShinyHunters vishing attacks spreading fast
The ShinyHunters hacking collective that caused chaos in 2025 is ramping up a new voice phishing campaign, with several potential victims already identified ...
Security
Developers Versus Automation Engineers: How We Ended the Fighting with the...
Hey developers and DevOps professionals: what if I told you that how you wrap and execute your automation tests could be the key to...
Most popular
ScarCruft continues to evolve, introduces Bluetooth harvester
Executive summary
After publishing our initial series of blogposts back in 2016, we have continued to track the ScarCruft threat actor. ScarCruft is a Korean-speaking...
Streamline security response at scale with AWS Security Hub automation
A new version of AWS Security Hub, is now generally available, introducing new ways for organizations to manage and respond to security findings. The...
The Shai-Hulud 2.0 npm worm: analysis, and what you need to know
Learn more about the Shai-Hulud 2.0 npm worm. - Read more
[R1] Tenable Identity Exposure Version 3.77.14 Fixes Multiple Vulnerabilities
Tenable Identity Exposure Version 3.77.14 Fixes Multiple Vulnerabilities Arnie Cabral Mon, 11/03/2025 - 09:50
Tenable Identity Exposure leverages third-party software to help provide...
















