SIEM as a Service

Latest Cyber Security News

cyber risk

The CISO’s Guide to Managing Cyber Risk in Hybrid Workplaces

Hybrid work has become a permanent fixture in the modern enterprise, blending remote and in-office operations to enhance flexibility and productivity. However, this model introduces...

UK Retailer Co-op Shuts Down IT Systems After Cyber Attack Attempt

The Co-operative Group, one of the UK’s largest retailers, has been forced to shut down parts of its IT infrastructure after detecting an attempted...

Ascension Healthcare Hacked via Third-party Business Partner: Patient Data Exposed

Ascension Healthcare, one of the largest private healthcare systems in the United States, has disclosed a significant data breach after sensitive patient information was...
SonicWALL Connect Tunnel Vulnerability

SonicWALL Connect Tunnel Vulnerability Allows Attackers to Create a DoS Condition

A significant security vulnerability has been identified in the SonicWall Connect Tunnel Windows Client, affecting both 32-bit and 64-bit versions.  This vulnerability, designated as CVE-2025-32817,...

OpenAI Rolled Out Last Week’s GPT-4o Update Causing Flattering Issues

OpenAI has reversed last week's update to its GPT-4o model after users reported the AI had become excessively agreeable and flattering, a behavior AI...

Konni APT Hackers Using Multi-Stage Malware to Attack Organizations

A sophisticated multi-stage malware campaign linked to the North Korean Konni APT group has been detected targeting organizations primarily in South Korea. Security researchers uncovered...

Outlaw Cybergang Attacking Linux Environments Worldwide With New Malware

A previously documented threat actor known as Outlaw (or “Dota”) has resurfaced with an enhanced malware toolkit targeting Linux servers globally, according to a...
SIEM as a Service

Recent News

CISA Adds Broadcom Brocade Fabric OS Vulnerability

CISA Adds Broadcom Brocade Fabric OS Vulnerability to Known Exploited Vulnerabilities Catalog

CISA officially added a significant security flaw affecting Broadcom’s Brocade Fabric OS to its authoritative Known Exploited Vulnerabilities (KEV) Catalog, underscoring the urgent need...
Craft CMS RCE 0-Day Vulnerability

Critical Craft CMS RCE 0-Day Vulnerability Exploited in Attacks to Steal Data

According to security researchers at CERT Orange Cyberdefense, a critical remote code execution (RCE) vulnerability in Craft CMS is actively being exploited to breach...
Ripple XPRL Official NPM Package Hijacked

Ripple XPRL Official NPM Package Hijacked To Inject Private Key Stealing Malware

A significant supply chain attack targeting cryptocurrency users. The official XRPL (Ripple) NPM package, which serves as the JavaScript SDK for the XRP Ledger,...

Researchers Uncovered SuperShell Payloads & Multiple Tools From Hacker’s Open Directories

Cybersecurity researchers have uncovered a concerning cache of hacking tools, including SuperShell payloads and Cobalt Strike beacons, exposed in plain sight within open directories...

Russian Hackers Attempting to Sabotage The Digital Control System of a Dutch Public Service

In a concerning development that marks a significant escalation in cyber warfare tactics, Russian hackers have been detected attempting to infiltrate and sabotage the...
Google Warns of 75 Zero-Day Vulnerabilities

Google Warns of 75 Zero-Day Vulnerabilities Exploited in the Wild

Google’s Threat Intelligence Group (GTIG) has revealed that 75 zero-day vulnerabilities were exploited in the wild during 2024, highlighting both evolving attacker tactics and...
Firefox 138 Released

Firefox 138 Released With Fix for Multiple High-Severity Vulnerabilities

Mozilla has released Firefox 138, addressing several high-severity security vulnerabilities while introducing long-awaited features, including improved profile management.  Security researchers identified multiple critical flaws that...
Git Configuration Files

Hackers Actively Attacking Git Configuration Files From 4,800+ IP’s

A notable increase in malicious scanning for exposed Git configuration files has been observed, posing significant risks of codebase theft and credential exposure for...

Vulnerability News

The rapid growth of the internet and connected systems has revolutionized the way we communicate, work, and live. However, this increased connectivity has also exposed vulnerabilities that malicious actors can exploit. One of the most common and disruptive forms of cyberattacks is the Denial of Service (DoS) attack. In this...

Top 10 Cyber Security Tools