Cybersecurity Blog
SubSnipe: Open-Source Tool for Finding Subdomains Vulnerable to Takeover
SubSnipe is an open-source tool designed to identify vulnerable subdomains at risk of takeover. Created by Florian ...
AppSec Webinar: How to Turn Developers into Security Champions
Let’s face it: AppSec and developers often feel like they’re on opposing teams. You’re battling ...
Russia-linked FIN7 Hackers Sell Their Security Evasion Tool to Other Groups on Darknet
Russia-linked cybercriminal group FIN7 sells its security evasion tool, AvNeutralizer, to other criminal gangs on ...
Automated Threats Pose Increasing Risk to the Travel Industry
As the travel industry rebounds post-pandemic, it is increasingly targeted by automated threats, with the sector ...
Weak Credentials Behind Nearly Half of All Cloud-Based Attacks, Research Finds
Credential mismanagement was the leading cause of cloud-based attacks in the first half of 2024, according to a Google ...
Cisco SSM On-Prem Bug Lets Hackers Change Any User’s Password
Tracked as CVE-2024-20419, the flaw enables remote attackers to set new passwords without authentication. Admins are ...
Most GitHub Actions Workflows are Insecure in Some Way
A report by Legit Security highlights concerns around the security posture of the GitHub Actions marketplace, with most ...
SAP AI Core Vulnerabilities Expose Customer Data to Cyber Attacks
Cybersecurity researchers have uncovered security shortcomings in SAP AI Core cloud-based platform for creating and ...