Pentesters: Is AI Coming for Your Role?

12/03/2025 0 Comments 0 tags

We’ve been hearing the same story for years: AI is coming for your job. In fact, in 2017, McKinsey printed a report, Jobs Lost, Jobs Gained: Workforce Transitions in a

URGENT: Microsoft Patches 57 Security Flaws, Including 6 Actively Exploited Zero-Days

12/03/2025 0 Comments 0 tags

Microsoft on Tuesday released security updates to address 57 security vulnerabilities in its software, including a whopping six zero-days that it said have been actively exploited in the wild. Of

Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks

12/03/2025 0 Comments 0 tags

Apple on Tuesday released a security update to address a zero-day flaw that it said has been exploited in “extremely sophisticated” attacks. The vulnerability has been assigned the CVE identifier

Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks

11/03/2025 0 Comments 0 tags

The threat actor known as Blind Eagle has been linked to a series of ongoing campaigns targeting Colombian institutions and government entities since November 2024. “The monitored campaigns targeted Colombian

Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices

11/03/2025 0 Comments 0 tags

Unpatched TP-Link Archer routers have become the target of a new botnet campaign dubbed Ballista, according to new findings from the Cato CTRL team. “The botnet exploits a remote code

Your Risk Scores Are Lying: Adversarial Exposure Validation Exposes Real Threats

11/03/2025 0 Comments 0 tags

In cybersecurity, confidence is a double-edged sword. Organizations often operate under a false sense of security, believing that patched vulnerabilities, up-to-date tools, polished dashboards, and glowing risk scores guarantee safety.

Steganography Explained: How XWorm Hides Inside Images

11/03/2025 0 Comments 0 tags

Inside the most innocent-looking image, a breathtaking landscape, or a funny meme, something dangerous could be hiding, waiting for its moment to strike. No strange file names. No antivirus warnings.

SideWinder APT Targets Maritime, Nuclear, and IT Sectors Across Asia, Middle East, and Africa

11/03/2025 0 Comments 0 tags

Maritime and logistics companies in South and Southeast Asia, the Middle East, and Africa have become the target of an advanced persistent threat (APT) group dubbed SideWinder. The attacks, observed

Moxa Issues Fix for Critical Authentication Bypass Vulnerability in PT Switches

11/03/2025 0 Comments 0 tags

Taiwanese company Moxa has released a security update to address a critical security flaw impacting its PT switches that could permit an attacker to bypass authentication guarantees. The vulnerability, tracked

CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List

11/03/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws impacting Advantive VeraCore and Ivanti Endpoint Manager (EPM) to its Known Exploited Vulnerabilities (KEV) catalog, based