by Beck Bailey | May 13, 2025 | RSS
A Türkiye-affiliated threat actor exploited a zero-day security flaw in an Indian enterprise communication platform called Output Messenger as part of a cyber espionage attack campaign since April 2024. “These exploits have resulted in a collection of related...
by Beck Bailey | May 12, 2025 | RSS
A Forrester VP explains to TechRepublic readers why three of these 10 emerging technologies for the year should be on managers’ radar now.
by Beck Bailey | May 12, 2025 | RSS
ASUS has released updates to address two security flaws impacting ASUS DriverHub that, if successfully exploited, could enable an attacker to leverage the software in order to achieve remote code execution. DriverHub is a tool that’s designed to automatically...
by Beck Bailey | May 12, 2025 | RSS
What do a source code editor, a smart billboard, and a web server have in common? They’ve all become launchpads for attacks—because cybercriminals are rethinking what counts as “infrastructure.” Instead of chasing high-value targets directly, threat actors are now...
by Beck Bailey | May 12, 2025 | RSS
Detecting leaked credentials is only half the battle. The real challenge—and often the neglected half of the equation—is what happens after detection. New research from GitGuardian’s State of Secrets Sprawl 2025 report reveals a disturbing trend: the vast...
Recent Comments