Top 10 Cybersecurity Trends to Expect in 2025
The 2025 cybersecurity landscape is increasingly complex, driven by sophisticated cyber threats,…
Ruijie Networks’ Cloud Platform Flaws Could Expose 50,000 Devices to Remote Attacks
Dec 25, 2024Ravie LakshmananCloud Security / Vulnerability Cybersecurity researchers have discovered several…
CISA Mandates Cloud Security for Federal Agencies by 2025 Under Binding Directive 25-01
Dec 19, 2024Ravie LakshmananCloud Security / Encryption The U.S. Cybersecurity and Infrastructure…
HubPhish Exploits HubSpot Tools to Target 20,000 European Users for Credential Theft
Dec 18, 2024Ravie LakshmananEmail Security / Cloud Security Cybersecurity researchers have disclosed…
Credentials and API Keys Leaking Online
Dec 12, 2024Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers are warning that…
Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks
Nov 29, 2024Ravie LakshmananAI Security / Cloud Security Microsoft has addressed four…
Phishing-as-a-Service “Rockstar 2FA” Targets Microsoft 365 Users with AiTM Attacks
Nov 29, 2024Ravie LakshmananCybercrime / Cloud Security Cybersecurity researchers are warning about…
From Logs to Runtime Protection
Nov 28, 2024The Hacker NewsCloud Security / Threat Detection Serverless environments, leveraging…
Matrix Botnet Exploits IoT Devices in Widespread DDoS Botnet Campaign
Nov 27, 2024Ravie LakshmananIoT Security / Network Security A threat actor named…


