Top 10 Best SOAR (Security Orchestration, Automation, And Response) Tools in 2025
Security Orchestration, Automation, and Response (SOAR) tools are revolutionizing how organizations defend against evolving threats,…
SonicWall Advises Users to Reset Logins After Config Backup Leak
SonicWall has alerted its customers to reset all login credentials after a recent leak exposed…
Insight Partners Confirms Data Breach Exposing Users’ Personal Data
Insight Partners, a global venture capital and private equity firm, has officially confirmed a significant…
Tracking New Entrants in Global Spyware Markets
Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a…
New ‘shinysp1d3r’ Ransomware-as-a-Service Targets VMware ESXi in Ongoing Development
EclecticIQ analysts assess with high confidence that ShinyHunters is expanding its operations by combining AI-enabled…
BMW Reportedly Hit by Everest Ransomware, Internal Files Stolen
The Everest ransomware group has claimed a major breach at Bayerische Motoren Werke AG (BMW),…
Qilin Ransomware Attack Impacts 104 Organizations in August
In August, Qilin once again reigned supreme in the global ransomware arena, claiming 104 victims…
Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks
SquareX first discovered and disclosed Last Mile Reassembly attacks at DEF CON 32 last year,…
Splunk Publishes Guide to Spot Remote Work Fraud in Organizations
Splunk today unveiled a comprehensive guide designed to empower security teams to detect Remote Employment…
Hackers Target Facebook Accounts in Latest Phishing Attack
A newly discovered phishing campaign is exploiting Facebook’s external URL warning feature to dupe users…