Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks
Jul 18, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have disclosed details of…
The Hidden Weaknesses in AI SOC Tools that No One Talks About
If you're evaluating AI-powered SOC platforms, you've likely seen bold claims: faster…
MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted
Jun 27, 2025Ravie LakshmananNetwork Security / Vulnerability Threat intelligence firm GreyNoise is…
Business Case for Agentic AI SOC Analysts
Security operations centers (SOCs) are under pressure from both sides: threats are…
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
Jun 25, 2025Ravie LakshmananSaaS Security / Vulnerability New research has uncovered continued…
6 Steps to 24/7 In-House SOC Success
Hackers never sleep, so why should enterprise defenses? Threat actors prefer to…
Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday disclosed that…
ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks
Jun 12, 2025Ravie LakshmananVulnerability / Software Security ConnectWise has disclosed that it's…
295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager
Jun 11, 2025Ravie LakshmananNetwork Security / Threat Intelligence Threat intelligence firm GreyNoise…


