Microsoft Corp. today issued security updates to fix more than 80 vulnerabilities in its Windows operating systems and software. There are no known “zero-day” or […]
Huge NPM Supply-Chain Attack Goes Out With Whimper
Threat actors phished Qix’s NPM account, then used their access to publish poisoned versions of 18 popular open-source packages accounting for more than 2 billion […]
Top 10 Best Internal Network Penetration Testing Providers in 2025
In a world of evolving threats, the security of an organization’s internal network is just as important as its external defenses. An internal network penetration […]
Qantas Reduces Executive Pay Following Cyberattack
The data breach, which occurred earlier this year, saw threat actors compromise a third-party platform to obtain Qantas customers’ personal information. The original article found […]
Is the Browser Becoming the New Endpoint?
While the jury is still out on whether the browser is the new endpoint, it’s clear that use has skyrocketed and security needs to align. […]
Microsoft September 2025 Patch Tuesday – 81 Vulnerabilities and 2 Zero Days Fixed
Microsoft has released its September 2025 Patch Tuesday update, addressing a total of 81 security vulnerabilities across its product portfolio. This extensive release includes fixes […]
Ivanti Endpoint Manager Vulnerabilities Allow Remote Code Execution by Attackers
Ivanti released Security Advisory for Endpoint Manager versions 2024 SU3 and 2022 SU8, detailing two high‐severity flaws (CVE-2025-9712 and CVE-2025-9872). Both issues stem from insufficient […]
Multiple Vulnerabilities Discovered in Ivanti Connect Secure, Policy Secure, and ZTA Gateways
Ivanti on September 9 released a security advisory detailing six medium and five high severity vulnerabilities impacting Ivanti Connect Secure, Policy Secure, ZTA Gateways, and Neurons for Secure Access. […]
FortiDDoS Vulnerability Lets Hackers Execute Unauthorized OS Commands
Fortinet has disclosed a significant OS command injection vulnerability in its FortiDDoS-F appliances that could allow privileged attackers to execute unauthorized code or commands through […]
Salty2FA Takes Phishing Kits to Enterprise Level
Cybercriminal operations use the same strategy and planning as legitimate organizations as they arm adversarial phishing kits with advanced features. The original article found on […]