SIEM as a Service

Latest Cyber Security News

Windows 11 KASLR Bypassed Using Cache Timing Techniques to Obtain The Kernel Base

Security researchers have discovered a new technique to bypass Kernel Address Space Layout Randomization (KASLR) in Windows 11, potentially weakening a critical security feature...

Hackers Leverage AutoIT Code to Deliver Malware Attacking Windows System

A sophisticated malware campaign utilizing multiple layers of AutoIT code has been discovered targeting Windows systems. The attack begins with a seemingly innocent executable file...
Exploits Windows Via UAC Bypass

Hackers Exploits Windows Via UAC Bypass Technique to Deploy Remcos RAT

A newly identified phishing campaign deploys the Remcos Remote Access Trojan (RAT) using DBatLoader, leveraging a User Account Control (UAC) bypass technique involving mock...

67% of Organizations Faces Cyber Attack in The Past 12 Months – New Report

Cyber attacks continue to plague organizations worldwide, with a staggering 67% of businesses reporting they faced at least one attack in the past year,...

Ivanti EPMM 0-day Vulnerability Actively Exploited in the Wild

Ivanti has disclosed two zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) solution. When chained together, these vulnerabilities allow attackers to execute unauthenticated remote...
Hacker Charged For Hijacking SEC Account

Hacker Charged for Hijacking SEC Account to Promote Fake Bitcoin News

Eric Council Jr., a 26-year-old man from Huntsville, Alabama, was sentenced on May 16, 2025, to 14 months in federal prison followed by three...
AI Web Application Firewalls Bypassed

AI Web Application Firewalls Bypassed Using Prompt Injection Techniques

Web Application Firewalls (WAFs) have been a critical defense mechanism protecting web applications from malicious traffic and attacks such as SQL Injection and Cross-Site...
SIEM as a Service

Cybersecurity Newsletter

Subscribe to the Cybersecurity News Briefing for the latest updates on cyber attacks, Threats, vulnerabilities, and expert insights.

Recent News

Ivanti EPMM 0-day Vulnerability Actively Exploited in the Wild

Ivanti has disclosed two zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) solution. When chained together, these vulnerabilities allow attackers to execute unauthenticated remote...
Hacker Charged For Hijacking SEC Account

Hacker Charged for Hijacking SEC Account to Promote Fake Bitcoin News

Eric Council Jr., a 26-year-old man from Huntsville, Alabama, was sentenced on May 16, 2025, to 14 months in federal prison followed by three...
AI Web Application Firewalls Bypassed

AI Web Application Firewalls Bypassed Using Prompt Injection Techniques

Web Application Firewalls (WAFs) have been a critical defense mechanism protecting web applications from malicious traffic and attacks such as SQL Injection and Cross-Site...
Social Engineering Tactics

Social Engineering Tactics – Training Employees to Stay Safe

As cybercriminals become ever more sophisticated, any organization's greatest vulnerability is its firewalls or software, not its people. Social engineering attacks, which manipulate human...
BreachForums Admin

BreachForums Admin to Pay $700,000 in Health Care Data Breach

Conor Brian Fitzpatrick, the 22-year-old former administrator of cybercrime marketplace BreachForums, will forfeit nearly $700,000 to settle a civil lawsuit related to a healthcare...

Vulnerability News

Certificate-Based Authentication (CBA) is a robust security mechanism that has been a cornerstone in high-security environments for decades. It leverages digital certificates to verify the identity of users, devices, or machines before granting access to resources. This article delves into the intricacies of CBA, exploring its functionality, benefits, challenges,...

Top 10 Cyber Security Tools