Proton Mail, the renowned privacy-focused email service, experienced a significant global outage today, leaving users worldwide unable to access their email accounts. The disruption began at approximately 10:00 AM ET,
Uncategorized
5 Benefits Of A Malware Sandbox For Business Security
Imagine an employee receiving an email that looks completely legitimate, maybe it’s a fake invoice or a shipping update. They click on the attachment, and just like that, your network
Rapid Cyber Incident Response: Why Speed, Quality, and the Right Tools Matter
As you probably know by now, it doesn’t really matter how big in size your business is, you’re going to be up against the risk of cyberattacks in some form
Wireshark 4.4.3 Released – What’s New!
The Wireshark Foundation has announced the release of Wireshark 4.4.3, the latest version of the world’s most popular network protocol analyzer. This update brings a host of bug fixes and
Ivanti VPN Zero-Day Vulnerability Actively Exploited in the Wild
Ivanti has disclosed actively exploiting a critical zero-day vulnerability, CVE-2025-0282, in its Connect Secure VPN appliances. This vulnerability allows unauthenticated remote code execution and has already been exploited in a
CVE Partnership with Thales Group as a Designated Root for Vulnerability Management
The CVE® Program has announced a significant expansion of its collaboration with Thales Group to strengthen the management and assignment of CVE Identifiers (CVE IDs) and the publication of CVE
CISA: Third-Party Data Breach Limited to Treasury Dept.
AMD & Dell Unveil Unveils Laptops Powered by Ryzen AI Processors
AMD and Dell Technologies revealed a new lineup of commercial laptops and desktops powered by AMD’s cutting-edge Ryzen AI PRO processors. This collaboration marks a significant milestone in the two
5th January and The Tale of Joshi Virus: India’s First Global Computer Virus
A throwback to January 5, 1990, marks the day the Joshi virus was unleashed — a significant event in the realm of technology and cybersecurity. Originating in India, the Joshi
Hackers Weaponize Pentesting Tools With Malicious npm, PyPI, & Ruby Packages
Threat actors leverage Out-of-Band Application Security Testing (OAST) techniques in the npm, PyPI, and RubyGems ecosystems to carry out multi-stage attacks, establish command and control (C2) channels, and exfiltrate sensitive