The Pwn2Own Berlin 2025 hacking competition has concluded, with security researchers earning $1,078,750 after exploiting 29 zero-day vulnerabilities and encountering some bug collisions. […] Go to Source Author: Sergiu Gatlan
Category Archives: Security
A new tool called ‘Defendnot’ can disable Microsoft Defender on Windows devices by registering a fake antivirus product, even when no real AV is installed. […] Go to Source Author: Lawrence Abrams
During the second day of Pwn2Own Berlin 2025, competitors earned $435,000 after exploiting zero-day bugs in multiple products, including Microsoft SharePoint, VMware ESXi, Oracle VirtualBox, Red Hat Enterprise Linux, and Mozilla Firefox. […] Go to Source Author: Sergiu Gatlan
As cyberthreats become more sophisticated, your business’s focus shouldn’t just be on collecting more data about them. The key is to use a threat intelligence platform (TIP) that filters out the noise and delivers the most relevant, actionable insights. Learn how to select a platform that fits seamlessly with your team’s expertise and existing infrastructure, […]
Organizations that invest in threat intelligence platforms (TIPs) often struggle to use them effectively. TIPs are designed to collect, analyze, and share threat data, but they can become overwhelming or underutilized without the right approach. Our guide helps you choose a platform that aligns perfectly with your team’s skills and existing infrastructure, empowering you to […]
A threat intelligence platform (TIP) should be more than just a data repository. In this post, we explore the key features that define an effective TIP and how to make sure it drives meaningful action rather than overwhelm your team with endless alerts. Align threat intelligence to your environment One of the biggest mistakes organizations […]
For at least half a year, the official software supplied with Procolored printers included malware in the form of a remote access trojan and a cryptocurrency stealer. […] Go to Source Author: Bill Toulas
Ransomware gang members increasingly use a new malware called Skitnet (“Bossnet”) to perform stealthy post-exploitation activities on breached networks. […] Go to Source Author: Bill Toulas
Twelve more suspects were charged in a RICO conspiracy for their alleged involvement in the theft of over $230 million in cryptocurrency and laundering the funds using crypto exchanges and mixing services. […] Go to Source Author: Sergiu Gatlan
On Thursday, CISA warned U.S. federal agencies to secure their systems against ongoing attacks exploiting a high-severity vulnerability in the Chrome web browser. […] Go to Source Author: Sergiu Gatlan



