The Global Playing Field is Leveling Out as Europe and Asia Take on More...

The latest DDoS trends include the return of large volumetric DDoS attacks, the rise of application targeted attacks, and businesses in Europe and Asia...

A Deep Dive into Database Attacks [Part IV]: Delivery and Execution of Malicious Executables...

In a previous post we covered different techniques for execution of SQL and OS commands through Microsoft SQL server that can be used for...

Why the Path Towards Zero Trust Starts with Next-Gen Access

Zero Trust Security has gained a lot of popularity over the last six months. Almost daily you can read articles about this security strategy...

Streamline Compliance with SWIFT Customer Security Program Requirements

Transferring money from our bank accounts has never been easier than it is today. With a single click on our smartphones, we can transfer...

Pocket cryptofarms

In recent months, the topic of cryptocurrency has been a permanent news fixture — the value of digital money has been see-sawing spectacularly. Such...

Industrial Cyber Security For Dummies

Industrial Cyber Security For Dummies #outlook a{ padding:0; } body{ width:100% !important;...

DevOps-Ready WAF: Scaling Security for a More Agile Environment

With the maturation of DevOps, the growing concern around the security and compliance of more agile application development systems has made 2018 the year...

GDPR and Privacy: How to Earn the Trust of Your Customers and Keep Regulators...

Customer data is the lifeblood of any organisation and the key to unlocking sales and growth. But the data you hold and how you...

Making the Grade: Achieve SSL Labs A+ Grade with Imperva WAF

We all woke up to a new reality early last year. HTTPS adoption has reached the tipping point, meaning that more than half of...

Your new friend, KLara

While doing threat research, teams need a lot of tools and systems to aid their hunting efforts – from systems storing Passive DNS data...

Latest article

Hackers Use Six-Layer Persistence to Maintain Access on Compromised FreePBX Systems

A hacker group known as INJ3CTOR3 has been running an active campaign against FreePBX systems, deploying a newly discovered PHP webshell called JOMANGY that...

Metasploit Wrap Up 05/22/2026

Another week, another authentication bypassOur humble Metasploit weekly(ish) blog has been blessed with a new network component vulnerability. The dynamic duo of @sfewer-r7 and...

FBI warns of Kali Oauth stealers

The FBI has warned of the danger from a new wave of phishing attacks generated by a tool called Kali365....

Microsoft Warns: Windows Zero-Day ‘YellowKey’ Can Bypass BitLocker

Microsoft has released a temporary mitigation for YellowKey, a Windows zero-day that can reportedly bypass BitLocker protections. The post Microsoft Warns: Windows Zero-Day ‘YellowKey’ Can...