Call for Presentations Open for SecurityWeek’s 2025 Supply Chain Security & Third-Party Risk Summit

The increasing frequency and severity of software supply chain attacks have sent shockwaves through the cybersecurity…

CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks

The US cybersecurity agency CISA is urging federal agencies to patch a second vulnerability in BeyondTrust…

Many Ivanti VPNs Still Unpatched as UK Domain Registry Emerges as Victim of Exploitation

A significant number of Ivanti VPNs are still exposed to attacks exploiting a recent vulnerability, and…

Critical Aviatrix Controller Vulnerability Exploited Against Cloud Environments

Threat actors are exploiting a critical-severity remote code execution (RCE) vulnerability in Aviatrix Controller to deploy…

Critical Deadline: Update Old .NET Domains Before January 7, 2025 to Avoid Service Disruption

Microsoft has announced that it’s making an “unexpected change” to the way .NET installers and archives…

Severe Security Flaws Patched in Microsoft Dynamics 365 and Power Apps Web API

Details have emerged about three now-patched security vulnerabilities in Dynamics 365 and Power Apps Web API…

Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them

In the past year, cross-domain attacks have gained prominence as an emerging tactic among adversaries. These operations exploit…

Patch Alert: Critical Apache Struts Flaw Found, Exploitation Attempts Detected

Threat actors are attempting to exploit a recently disclosed security flaw impacting Apache Struts that could…

Not Your Old ActiveState: Introducing our End-to-End OS Platform

Having been at ActiveState for nearly eight years, I’ve seen many iterations of our product. However,…

APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP

The Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as…