Bridging the Remediation Gap: Introducing Pentera Resolve

22/10/2025 0 Comments 0 tags

From Detection to Resolution: Why the Gap Persists A critical vulnerability is identified in an exposed cloud asset. Within hours, five different tools alert you about it: your vulnerability scanner,

Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware

22/10/2025 0 Comments 0 tags

Government, financial, and industrial organizations located in Asia, Africa, and Latin America are the target of a new campaign dubbed PassiveNeuron, according to findings from Kaspersky. The cyber espionage activity

TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution

22/10/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a high-severity flaw impacting the popular async-tar Rust library and its forks, including tokio-tar, that could result in remote code execution under certain conditions.

TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution

22/10/2025 0 Comments 0 tags

TP-Link has released security updates to address four security flaws impacting Omada gateway devices, including two critical bugs that could result in arbitrary code execution. The vulnerabilities in question are

PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign

21/10/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on the inner workings of a botnet malware called PolarEdge. PolarEdge was first documented by Sekoia in February 2025, attributing it to a campaign targeting

Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams

21/10/2025 0 Comments 0 tags

Meta on Tuesday said it’s launching new tools to protect Messenger and WhatsApp users from potential scams. To that end, the company said it’s introducing new warnings on WhatsApp when

Securing AI to Benefit from AI

21/10/2025 0 Comments 0 tags

Artificial intelligence (AI) holds tremendous promise for improving cyber defense and making the lives of security practitioners easier. It can help teams cut through alert fatigue, spot patterns faster, and

Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network

21/10/2025 0 Comments 0 tags

A European telecommunications organization is said to have been targeted by a threat actor that aligns with a China-nexus cyber espionage group known as Salt Typhoon. The organization, per Darktrace,

Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers

21/10/2025 0 Comments 0 tags

A new malware attributed to the Russia-linked hacking group known as COLDRIVER has undergone numerous developmental iterations since May 2025, suggesting an increased “operations tempo” from the threat actor. The

Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets

20/10/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws to its Known Exploited Vulnerabilities (KEV) Catalog, officially confirming a recently disclosed vulnerability impacting Oracle E-Business