News

A whistleblower in the NLRB said in sworn testimony that staffers within the Musk-led DOGE group breached agency systems, exfiltrated sensitive data, and used tools and techniques similar to those ...
In every HTTP request, the user agent header acts as a self-declared identity card for the client—typically a browser—sharing ...
Struggling with proprietary identity solutions? This comprehensive guide explores how open source CIAM platforms offer ...
Home » Cybersecurity » Application Security » Your Detectify Alternative: How Does Escape DAST Stack Up? Detectify is one of ...
Oracle addresses 171 CVEs in its second quarterly update of 2025 with 378 patches, including 40 critical updates.BackgroundOn ...
MITRE’s CVE program has been an important pillar in cybersecurity for over two decades. The lack of certainty surrounding the ...
Mitre’s CVE’s program—which provides common naming and other informational resources about cybersecurity vulnerabilities—was about to be cancelled, as the US Department of Homeland Security failed to ...
PyPI supply chain attack is a stark reminder of just how vulnerable cloud ecosystems remain to sophisticated, stealthy, and ...
The Trump Administration is ending funding for MITRE's crucial CVE database program, a move that promises to hobble cybersecurity efforts around the world. However, CVE Board members introduce a new ...
IntroductionThe Zscaler ThreatLabz team discovered new activity associated with Mustang Panda, originating from two machines from a targeted organization in Myanmar. This research led to the discovery ...
Just before we went to press, Sergiu Gatlan tells of a temporary reprieve: CISA extends funding to ensure ‘no lapse in critical CVE services’ ...
This is Part 2 of our two-part technical analysis on Mustang Panda’s new tools. For details on ToneShell and StarProxy, go to Part 1.IntroductionIn addition to the new ToneShell variants and StarProxy ...