
The real SOC lever: integrated intelligence in the first line
There is an uncomfortable truth that security officials know too well: those who occupy the first line of detection in a security operations centre are also often the least experi…
News about data leaks, security gaps and information exposure

There is an uncomfortable truth that security officials know too well: those who occupy the first line of detection in a security operations centre are also often the least experi…

In the less visible corners of the Internet, site management credentials have become merchandise. Access to hosting panels such as cPanel - the interface that millions of sites us…

Amazon has confirmed that several physical facilities of Amazon Web Services (AWS) in the Gulf have suffered damage from drone attacks, an event that has caused a significant inte…

A new phishing kit called Starkiller has turned on the alarms in the cybersecurity world. Researchers have found that this service is not limited to replicating false pages, but t…

Cloud Imperium Games, the independent studio known by Star Citizen and Squadron 42, has confirmed that it suffered an intrusion into its systems at the end of January. The America…

Google has published a package of Android security patches that fixes 129 vulnerabilities, including a zero-day failure that already appears to be being used in targeted attacks a…

The most worrying thing, according to researchers, is that this web service includes a WebSocket relay that allows you to run HTTP requests from the victim's browser with any meth…

A few days ago a high-gravity vulnerability was corrected in OpenClaw which, under the right conditions, would have allowed a malicious website to connect to an IA agent running l…

The story was collected by Korean media as Maeil Kyungjae (MK) who also cited experts in on-chain analysis. Professor Cho Jae-woo, from Hansung University in Seoul, summed up the …