Category: EN

Conducting Penetration Testing – CISO’s Resource Guide

In today’s digital landscape, organizations are constantly threatened by cyber adversaries who exploit vulnerabilities with increasing sophistication. For Chief Information Security Officers (CISOs), penetration testing is no longer a periodic checkbox but a dynamic and strategic necessity. It enables organizations…

Two SonicWall SMA100 flaws actively exploited in the wild

SonicWall confirmed that threat actors actively exploited two vulnerabilities impacting its SMA100 Secure Mobile Access (SMA) appliances. SonicWall revealed that attackers actively exploited two security vulnerabilities, tracked as CVE-2023-44221 and CVE-2024-38475, in its SMA100 Secure Mobile Access appliances. Below are the…

FBI Publishes 42,000 LabHost Phishing Domains

The FBI has released details of 42,000 phishing domains associated with the LabHost operation, in order to help the security community This article has been indexed from www.infosecurity-magazine.com Read the original article: FBI Publishes 42,000 LabHost Phishing Domains

North Korea Stole Your Job

For years, North Korea has been secretly placing young IT workers inside Western companies. With AI, their schemes are now more devious—and effective—than ever. This article has been indexed from Security Latest Read the original article: North Korea Stole Your…

TehetségKapu – 54,357 breached accounts

In March 2025, almost 55k records were breached from the Hungarian education office website TehetségKapu. The data was subsequently published to a popular hacking forum and included email addresses, names and usernames. This article has been indexed from Have I…