Network Security

ENISA to Chair EU Agencies Network, Enhance Cybersecurity Standards
Testing & Security ENISA to Chair EU Agencies Network, Enhance Cybersecurity Standards

The appointment of the EU Agency for Cybersecurity (ENISA) as the chair of the EU Agencies Network (EUAN) beginning March 1, 2025, marks a significant step towards strengthening cybersecurity standards across Europe. This new role involves leading inter-agency cooperation to raise the common level

Surge in Endpoint Malware: Social Engineering and Legit Platforms Exploited
Software Development Surge in Endpoint Malware: Social Engineering and Legit Platforms Exploited

The third quarter of 2024 witnessed a dramatic escalation in endpoint malware detections, skyrocketing by 300% compared to the previous quarter. This alarming trend was revealed by WatchGuard Technologies, which noted a significant shift in cybercriminal tactics. Attackers are increasingly

Are You Vulnerable to the Latest Palo Alto Firewall Exploits?
Testing & Security Are You Vulnerable to the Latest Palo Alto Firewall Exploits?

With the increasing sophistication of cyber threats, staying ahead in cybersecurity is paramount for organizations across the globe. Recently, a critical vulnerability surfaced in Palo Alto Networks' PAN-OS management web interface, threatening the security of numerous firewalls. Labeled

How Are Russian Hackers Using Device Code Phishing to Breach Microsoft 365?
Software Development How Are Russian Hackers Using Device Code Phishing to Breach Microsoft 365?

In an increasingly interconnected world, safeguarding digital assets has never been more crucial. Yet, Russian hackers known as Storm-2372 have managed to breach Microsoft 365 accounts with alarming success. Their sophisticated phishing campaign exploits device code authentication, a mechanism

Cyber Threats Escalate: Global Vulnerabilities and State-Sponsored Attacks
Testing & Security Cyber Threats Escalate: Global Vulnerabilities and State-Sponsored Attacks

The cybersecurity landscape is witnessing unprecedented developments, with state-sponsored cyber campaigns, newly discovered vulnerabilities, and significant remediation efforts taking center stage. The increasingly sophisticated cyber threats executed by global actors are targeting critical

Which Are the Best UTM Firewalls for Comprehensive Cybersecurity in 2025?
Testing & Security Which Are the Best UTM Firewalls for Comprehensive Cybersecurity in 2025?

In the rapidly evolving digital landscape, cybersecurity is more critical than ever, with increasingly sophisticated cyber threats targeting various sectors. Unified Threat Management (UTM) firewalls have emerged as vital tools in defending against such threats by integrating multiple security

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later