SIEM as a Service
Fortinet Ends SSL-VPN Support From 7.6.3 Onwards! 

Fortinet Ends SSL-VPN Support From 7.6.3 Onwards! 

Fortinet has announced the complete removal of SSL VPN tunnel mode functionality in the upcoming FortiOS 7.6.3 release.  This change, affecting all FortiGate models regardless of size, marks the culmination of Fortinet's gradual phase-out of...
Linux Kernel Vulnerability

Linux Kernel Vulnerability Let Attackers Escalate Privilege – PoC Released 

A newly discovered vulnerability, CVE-2024-53141, in the Linux kernel’s IP sets framework has exposed a critical security flaw that allows local attackers to escalate privileges and potentially gain root access.  The vulnerability, assigned a CVSS...
Global Zoom Outage Caused by Server Block Imposed from GoDaddy Registry

Global Zoom Outage Caused by Server Block Imposed from GoDaddy Registry

On April 16, 2025, millions of users worldwide found themselves unable to access Zoom, the widely used video conferencing platform, due to a critical outage that lasted nearly two hours. The disruption, which began...
Chrome Extensions

6,000,000+ Installed Chrome Extensions Can Execute Remote Commands on User’s Browser

A major security incident has come to light involving more than six million installations of Chrome browser extensions that secretly execute remote commands, track user activity, and potentially expose sensitive information. John Tuckner of...
Passive DNS

How to Use Passive DNS To Trace Hackers Command And Control Infrastructure

Passive DNS has emerged as a critical tool for cybersecurity professionals seeking to identify and track malicious command and control (C2) infrastructure. By creating a historical record of DNS activities, security teams can follow...
Web Server Hardening

Web Server Hardening Best Practices For Organizations Across Industries

Web server hardening is a critical security process that reduces an organization's attack surface and helps defend against ransomware, malware, and other cyberthreats. In today's threat landscape, web servers are prime targets for attackers...
targeted cyber attack

How To Use YARA Rules To Identify Financial Sector Targeted Attacks

The financial sector faces increasingly sophisticated cyber threats, with system intrusion remaining the leading attack pattern for the third consecutive year. Advanced Persistent Threat (APT) groups specifically target financial institutions using various tools, techniques,...
Incident Response

How Security Analyst Using Memory Forensics Tools To Enhance Advanced Incident Response

Memory forensics has become an indispensable component of modern incident response strategies, enabling security teams to detect and analyze sophisticated threats that would otherwise remain hidden. Unlike traditional disk forensics, memory analysis provides insights...
DOGE Hacked

U.S DOGE Allegedly Hacked – Fed Whistleblower Leaked Most Disturbing Documents

A federal whistleblower "Daniel Berulis", A senior DevSecOps architect has allegedly sent a affidavit document of a U.S DOGE significant data breach at the National Labor Relations Board (NLRB), claiming that personnel from the...
Fortinet Devices Compromised

17,000+ Fortinet Devices Compromised in Massive Hack via Symbolic Link Exploit

17,000+ Fortinet devices worldwide have been compromised in a sophisticated cyberattack that leverages a symbolic link persistence technique, according to new findings from Shadowserver. The number of affected devices has climbed from an initial...
SIEM as a Service

Recent Posts