LATEST

Torq Uses AI-Powered Hyper Automation to Take SOCs Beyond SOAR

Torq Uses AI-Powered Hyper Automation to Take SOCs Beyond SOAR

Security Orchestration, Automation and Response (SOAR) can now scale well beyond the limitations of conventional platforms thanks to the

2026s Top 10 DNS Filtering Options

2026s Top 10 DNS Filtering Options

CYBER ATTACKZerowl

Top DNS Filtering Options DNS filtering continues to be cybersecurity's silent workhorse.

The Top 10 Cybersecurity E-Signature Solutions for 2026

The Top 10 Cybersecurity E-Signature Solutions for 2026

CYBER ATTACKZerowl

Secure electronic signatures are now a crucial part of contemporary cybersecurity strategies as businesses accelerate their digital transformation

RedKitten, an Iran-affiliated cyberattack, targets activists and human rights organizations.

RedKitten, an Iran-affiliated cyberattack, targets activists and human rights organizations.

A new campaign that targets non-governmental organizations and individuals involved in documenting recent human rights abuses is suspected to be the

Seven New Exploit Modules for FreePBX, Cacti, and SmarterMail Are Released by Metasploit

Seven New Exploit Modules for FreePBX, Cacti, and SmarterMail Are Released by Metasploit

CYBER ATTACKZerowl

With seven new exploit modules that target popular enterprise software, this week's update to the Metasploit Framework offers penetration testers

Mandiant discovers vishing attacks akin to ShinyHunters that steal MFA in order to compromise SaaS platforms.

Mandiant discovers vishing attacks akin to ShinyHunters that steal MFA in order to compromise SaaS platforms.

On Friday, Google-owned Mandiant announced that it had discovered a "expansion in threat activity" that employs tradecraft typical of

Top 5 this week

Page 158 of 202