SIEM as a Service

Latest Cyber Security News

North Korean Kimsuky Hackers New Tactics & Malicious Scripts in Latest Attacks

A sophisticated cyberattack campaign attributed to the North Korean Advanced Persistent Threat (APT) group Kimsuky has been observed utilizing new tactics and malicious scripts. The...
Windows 11 24H2 Update

Windows 11 24H2 Update Breaks Connection to the Veeam Backup Server

A critical issue affecting Windows 11 24H2 users has emerged, disrupting the connection between Veeam Recovery Media and backup servers.  The problem, linked to Microsoft's...
NetApp SnapCenter

Critical NetApp SnapCenter Server Vulnerability Let Attackers Become an Admin User 

A high-severity security vulnerability discovered in NetApp SnapCenter could allow authenticated users to gain administrative privileges on remote systems, posing significant risks to organizational...
Password Rotation Error

Cloudflare Attributes Recent Service Outage to Password Rotation Error

A credential rotation error led to widespread service disruptions across multiple Cloudflare products on March 21, 2025, affecting customers globally for over an hour.  The...

200 Unique Domains Used by Raspberry Robin Unveiled

Raspberry Robin, a complex and evolving malware threat, has been operating since 2019, initially spreading through infected USB drives at print and copy shops. This...
Clevo Devices

Clevo Devices Boot Guard Private Key Exposed Via Firmware Update Packages

Researchers have discovered a major security vulnerability affecting multiple gaming laptop models using Clevo hardware.  Boot Guard private keys were found exposed within firmware update...
DrayTek Routers

DrayTek Routers Vulnerability Exploited in the Wild – Possibly Links to Reboot Loop

Multiple internet service providers worldwide are reporting widespread disruptions as DrayTek routers enter continuous reboot loops, affecting businesses and consumers alike.  Security intelligence firm GreyNoise...
SIEM as a Service

Recent News

Caido v0.47.0

Caido v0.47.0 Released – Burp Suite Alternative Web Pentesting Tool Brings New Features

Caido, the innovative security testing tool positioning itself as a compelling alternative to Burp Suite, has just rolled out its latest update, version 0.47.0....

Beware of Fake Meta Email’s From Hackers That Steal Your Ad Account Login’s

A dangerous new phishing campaign targeting businesses that use Meta platforms for advertising has been discovered. The scam begins with users receiving an urgent email...

Chinese Salt Typhoon Hackers Exploiting Exchange Vulnerabilities to Attack Organizations

Security researchers have identified a sophisticated Chinese APT group known as Salt Typhoon that has been actively exploiting Microsoft Exchange's ProxyLogon vulnerabilities to compromise...

ARACNE – LLM-based Pentesting Agent To Execute Commands on Real Linux Shell Systems

Cybersecurity researchers have unveiled a new autonomous penetration testing agent that leverages large language models (LLMs) to execute commands on real Linux shell systems. ARACNE,...
Hackers Exploiting Checkpoint’s Driver

Hackers Exploiting Checkpoint’s Driver in BYOVD Attack to Bypass Windows Security

A sophisticated attack where threat actors exploited vulnerabilities in vsdatant.sys, a kernel-level driver used by Checkpoint's ZoneAlarm antivirus software.  Originally released in 2016, this driver...
NetApp SnapCenter

Critical NetApp SnapCenter Server Vulnerability Let Attackers Become an Admin User 

A high-severity security vulnerability discovered in NetApp SnapCenter could allow authenticated users to gain administrative privileges on remote systems, posing significant risks to organizational...

Pocket Card Users Under Attack Via Sophisticated Phishing Campaign

A highly targeted phishing campaign is currently exploiting Pocket Card users through elaborately crafted emails that appear to originate from the legitimate financial service...
Ingress NGINX

Ingress NGINX Remote Code Execution Vulnerability Let Attacker Takeover Cluster

Researchers have uncovered a series of critical security vulnerabilities in the Ingress NGINX Controller for Kubernetes, collectively dubbed "IngressNightmare."  These flaws could allow unauthenticated attackers...

Vulnerability News

Email remains one of the most critical forms of communication for businesses, individuals, and organizations around the world. However, it also presents a major attack vector for cybercriminals, who use various techniques such as phishing, spoofing, and other email-based attacks to exploit vulnerabilities. To combat these threats, several email...

Top 10 Cyber Security Tools