Category: EN

Top 5 Cybersecurity Automation Tools Transforming Risk Management

The expanding attack surface and growing regulatory requirements have created an unsustainable workload for cybersecurity teams relying on manual processes. Organizations now recognize that automation isn’t just a convenience—it’s a strategic necessity for effective risk management. This article examines five…

Tufin TOS Discovery automates device discovery and onboarding

Tufin launched Tufin Orchestration Suite (TOS) Discovery, a new solution that helps security teams ensure their network topology is always accurate and up-to-date. Maintaining up-to-date network topology is a crucial task – one that enables proper enforcement of security policies…

PoC Exploit Published for macOS Sandbox Escape Vulnerability (CVE-2025-31258)

Security researchers have disclosed a new macOS sandbox escape vulnerability tracked as CVE-2025-31258, accompanied by a proof-of-concept (PoC) exploit demonstrating partial sandbox bypass via Apple’s RemoteViewServices framework. The flaw, discovered by researcher wh1te4ever, exposes weaknesses in macOS’s inter-process communication (IPC)…

Zoom Workplace Apps Flaws Allow Hackers to Gain Elevated Access

Zoom has released multiple security bulletins addressing seven newly discovered vulnerabilities in Zoom Workplace Apps, with one rated as high severity. All vulnerabilities were disclosed on May 13, 2025, and could potentially allow attackers to escalate privileges through various attack…

Product showcase: Go beyond VPNs and Tor with NymVPN

If you care about online privacy, you probably already know: Centralized VPNs and even Tor aren’t enough anymore. Traditional VPNs require you to trust a single company with your internet activity. Even if they promise “no logs,” you’re still handing…

DefectDojo boosts unified vulnerability management

DefectDojo launched risk-based prioritization capabilities for DefectDojo Pro. This new feature enables application and infrastructure security teams to prioritize vulnerabilities based on real-world risk—not just severity scores—using a range of factors including exploitability, reachability, revenue impact, potential compliance penalties, user…

F5 BIG-IP Vulnerability Allows Remote Command Execution

Critical security vulnerability in F5 BIG-IP systems has been discovered that allows authenticated administrators to execute arbitrary system commands, effectively bypassing security boundaries. Identified as CVE-2025-31644, the command injection flaw affects multiple versions of BIG-IP running in Appliance mode. Security…