Category: Cyber Security News

Beware of Fake Booking.com Sites That Infects Your Devices With AsyncRAT

Cybercriminals have launched a sophisticated campaign targeting travelers through fake Booking.com websites that deploy AsyncRAT malware, according to recent security research. The threat actors redirect users from gaming sites, social media platforms, and sponsored advertisements to convincing replica booking sites…

New ModSecurity WAF Vulnerability Let Attackers Crash the System

A significant denial of service vulnerability has been discovered in ModSecurity, one of the most widely deployed open-source web application firewall (WAF) engines used to protect Apache, IIS, and Nginx web servers.  The vulnerability, designated as CVE-2025-48866, affects all ModSecurity…

SentinelOne Global Service Outage Root Cause Revealed

Cybersecurity company SentinelOne has released a comprehensive root cause analysis revealing that a software flaw in an infrastructure control system caused the global service disruption that affected customers worldwide on May 29, 2025. The outage, which lasted approximately 20 hours,…

Future of Passwords Biometrics and Passwordless Authentication

The digital authentication landscape is dramatically transforming as passwordless technologies gain unprecedented momentum. Passkey adoption surging 400% in 2024 alone. Despite predictions that passwords will become obsolete, emerging evidence suggests the future lies not in their complete elimination but in…

Ransomware Negotiation When and How to Engage Attackers

As ransomware attacks devastate organizations globally, many companies are turning to professional negotiators to engage directly with cybercriminals, despite strong government opposition to paying ransoms. This emerging practice has sparked intense debate about when negotiation becomes necessary and how organizations…

DSPM vs. DLP:Understanding the Key Differences

Modern organizations face a growing challenge in protecting sensitive data. As more people adopt the cloud and rules get tougher, smart and adaptable security is now a must. Two approaches often compared are DSPM and DLP. While both aim to…