Adobe has released critical security updates for Adobe Experience Manager (AEM) Forms on Java Enterprise Edition following the discovery of two severe vulnerabilities that could […]
How cybersecurity leaders are securing AI infrastructures
With every new technological revolution, new security risks appear, but in the rush to deploy the new technologies such as generative AI, security is often […]
Threat Actors Weaponizing RMM Tools to Gain System Control and Exfiltrate Data
Adversaries are using Remote Monitoring and Management (RMM) tools more frequently as dual-purpose weapons for initial access and persistence in the constantly changing world of […]
10 Best IT Asset Management Tools in 2025
In today’s fast-paced digital landscape, effective IT Asset Management (ITAM) is crucial for organizations to maintain control over their hardware, software, and cloud assets. Modern […]
How not to hire a North Korean IT spy
CISOs looking for new IT hires already struggle with talent market shortages and bridging cybersecurity skills gaps. But now they face a growing challenge from […]
CISA Adds 3 D-Link Router Flaws to KEV Catalog After Active Exploitation Reports
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three old security flaws impacting D-Link routers to its Known Exploited Vulnerabilities (KEV) catalog, […]
MCPoison Attack Abuses Cursor IDE to Run Arbitrary System Commands
Cybersecurity researchers have uncovered a critical vulnerability in Cursor IDE that allows attackers to execute arbitrary system commands through a sophisticated trust bypass mechanism, potentially […]
AI Is Transforming Cybersecurity Adversarial Testing – Pentera Founder’s Vision
When Technology Resets the Playing Field In 2015 I founded a cybersecurity testing software company with the belief that automated penetration testing was not only […]
With Eyes on AI, African Orgs Push Security Awareness
Against the backdrop of the artificial intelligence surge, most African organizations have some form of cybersecurity awareness training but fail to test frequently and don’t […]
CISA Alerts on Ongoing Exploits Targeting D-Link Device Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) has escalated its campaign to protect U.S. networks by adding three newly exploited D-Link device vulnerabilities to its […]