Speed at scale: Let’s Encrypt serving Shopify’s 4.5 million domains

What does it take to manage TLS certificates at a leading e-commerce company? Before Let’s Encrypt, it took the security team at Shopify weeks...

Fraud Scenarios in the Buy Now, Pay Later Ecosystem

Existing fraud tricks are finding new use in buy now, pay later payment systems. - Read more

What you need to know about Process Ghosting, a new executable image tampering attack

Several common process tampering attacks exploit the gap between process creation and when security products are notified. Elastic Security detects a variety of such...

Can Bots Manipulate Data and Change Facts to Fiction?

Data manipulation is a real threat to data-driven approaches at enterprises. We tested one of our own assets to see the possibilities. - Read...

What Is Phishing? How to Recognize and Avoid It

"What is phishing" is still a relevant question we're answering as the attack type and techniques evolve, victimizing even the most tech-savvy users. -...

Introducing the Cryptonice HTTPS Scanner

F5 Labs has released a new open-source tool to check for HTTPS misconfigurations of public and internally hosted HTTPS websites. - Read more

Four Risks to Consider with Expanded VPN Deployments

The rush to deploy remote access solutions can bring unexpected risks to light. - Read more

Vulnerabilities, Exploits, and Malware Driving Attack Campaigns in December 2019

Threat campaign activity in December 2019 doubled from the previous month. - Read more

Ransomware: two pieces of good news

“All your files have been encrypted.” How many times has this suddenly popped up on your screen? We hope never, because it’s one of...

Latest article

CVE-2026-41940: cPanel & WHM Authentication Bypass

OverviewOn April 28, 2026, cPanel issued a security update to fix a critical vulnerability affecting the cPanel & WHM and WP Squared products. In...

Cursor Extension Flaw Exposes Developer API Keys

Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX - Read more

CVE-2026-21246 Windows Graphics Component Elevation of Privilege Vulnerability

Acknowledgement added. This is an informational change only. - Read more

ClickUp Data Leak Exposes Enterprise Emails for Over a Year

A hardcoded ClickUp API key exposed hundreds of corporate and government emails for over a year, raising new SaaS security concerns. The post ClickUp Data...