CISA Adds 2 VeraCore Vulnerabilities to Known Actively Exploit Vulnerability Catalog
CISA has likely added two VeraCore vulnerabilities, CVE-2024-57968 and CVE-2025-25181, to its Known Exploited Vulnerabilities (KEV) catalog due to active exploitation by the XE Group.
These vulnerabilities impact VeraCore, a warehouse management software by Advantive,...
Top 5 Notable Cyber Attacks in December 2024
The cybersecurity research team at ANY.RUN, leveraging their Interactive Sandbox and Threat Intelligence Lookup tools, has uncovered and analyzed a range of emerging threats throughout December 2024.
The team highlighted fascinating trends and vital...
Mastercard Completes Acquisition of Cybersecurity Firm Recorded Future for $2.6 Billion
Mastercard (NYSE: MA) has officially finalized the acquisition of Recorded Future, a leading provider of AI-driven threat intelligence.
Mastercard Operating in over 200 countries and territories worldwide, Mastercard is a global leader in enabling...
IBM QRadar SIEM Vulnerability Let Hackers Inject Malicious JavaScript In Web UI
A critical XSS vulnerability identified in IBM's QRadar SIEM (Security Information and Event Management) platform, tracked as CVE-2024-47107, allows authenticated users execute malicious Javascript code through the platform's web interface, prompting immediate concern among...
Microsoft Integrates Azure Firewall with Azure Standard Load Balancer to Boost Security
Microsoft Azure has unveiled new integration capabilities between Azure Firewall and Azure Standard Load Balancer, enabling users to create more robust and secure network architectures.
Whether you opt for a public or internal load...
New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security
Cybersecurity firm Mandiant has uncovered a novel method to bypass browser isolation technologies, a widely used security measure designed to protect users from web-based attacks such as phishing and malware.
This new way to...
Examples of Phishing Attacks and How to Effectively Analyze Them
Analyzing phishing attacks have become challenging as these threats continue to evolve in complexity, employing more sophisticated techniques to bypass traditional defenses.
The tools used to analyze such attacks must also adapt, requiring constant improvement...