2025 State of SaaS Backup and Recovery Report
The modern workplace has undergone a seismic transformation over recent years, with…
Over 100 Security Flaws Found in LTE and 5G Network Implementations
Jan 24, 2025Ravie LakshmananTelecom Security / Vulnerability A group of academics has…
CISA Adds Five-Year-Old jQuery XSS Flaw to Exploited Vulnerabilities List
Jan 24, 2025Ravie LakshmananVulnerability / JavaScript The U.S. Cybersecurity and Infrastructure Security…
Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits
Jan 23, 2025Ravie LakshmananFirmware Security / Vulnerability An exhaustive evaluation of three…
How to Eliminate Identity-Based Threats
Despite significant investments in advanced technologies and employee training programs, credential and…
Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet
Threat actors are exploiting an unspecified zero-day vulnerability in Cambium Networks cnPilot…
Trump Terminates DHS Advisory Committee Memberships, Disrupting Cybersecurity Review
Jan 22, 2025Ravie LakshmananCybersecurity / National Security The new Trump administration has…
PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack
A previously undocumented China-aligned advanced persistent threat (APT) group named PlushDaemon has…
13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks
Jan 21, 2025Ravie LakshmananEmail Security / Botnet A global network of about…


