Tag: Cyber Security News

What Is Cyber Threat Intelligence: Quick Guide For CISOs

Cyber threat intelligence (CTI) is the practice of collecting, analyzing, and transforming data about cyber threats into actionable insights to protect organizations. For Chief Information Security Officers (CISOs), understanding and leveraging threat intelligence is crucial to safeguarding organizational assets and…

Beware of Fake Booking.com Sites That Infects Your Devices With AsyncRAT

Cybercriminals have launched a sophisticated campaign targeting travelers through fake Booking.com websites that deploy AsyncRAT malware, according to recent security research. The threat actors redirect users from gaming sites, social media platforms, and sponsored advertisements to convincing replica booking sites…

New ModSecurity WAF Vulnerability Let Attackers Crash the System

A significant denial of service vulnerability has been discovered in ModSecurity, one of the most widely deployed open-source web application firewall (WAF) engines used to protect Apache, IIS, and Nginx web servers.  The vulnerability, designated as CVE-2025-48866, affects all ModSecurity…

SentinelOne Global Service Outage Root Cause Revealed

Cybersecurity company SentinelOne has released a comprehensive root cause analysis revealing that a software flaw in an infrastructure control system caused the global service disruption that affected customers worldwide on May 29, 2025. The outage, which lasted approximately 20 hours,…

Future of Passwords Biometrics and Passwordless Authentication

The digital authentication landscape is dramatically transforming as passwordless technologies gain unprecedented momentum. Passkey adoption surging 400% in 2024 alone. Despite predictions that passwords will become obsolete, emerging evidence suggests the future lies not in their complete elimination but in…

Ransomware Negotiation When and How to Engage Attackers

As ransomware attacks devastate organizations globally, many companies are turning to professional negotiators to engage directly with cybercriminals, despite strong government opposition to paying ransoms. This emerging practice has sparked intense debate about when negotiation becomes necessary and how organizations…