We’re excited to announce the release of RELIANOID Load Balancer Enterprise Version 6.2.33, packed with several improvements and bug fixes to enhance your load balancing experience. Below are the detailed...
OWASP Top 10 Overview The OWASP Top 10 is a globally recognized standard for understanding and addressing the most critical security risks to web applications. Developed by the Open Web...
In the world of cybersecurity, the recent revelation of a backdoor almost merging into the ubiquitous xz Utils, a data compression tool widely used in Linux and Unix-like systems, has...
On March 5, 2024, Meta Platforms Inc., the parent company of Facebook, Instagram, and Threads, experienced a global outage that left millions of users unable to access their accounts for...
The widespread adoption of virtualization in recent years has revolutionized the efficiency and scalability of IT infrastructure, offering cost-effective solutions to businesses. While over 90% of organizations have embraced server...
Cybercriminal tactics like phishing and social engineering, commonly employed to infect critical systems with malware or ransomware, have surged to epidemic levels, with no signs of abating. It is predicted...
In a recent incident (last 3rd January), Orange Spain encountered a significant internet outage due to a cyberattack that targeted the company’s RIPE account. The threat actor, identified as ‘Snow,’...
Emerging threats demand continuous attention to fortify businesses against potential vulnerabilities. Recently, researchers uncovered a critical flaw in the SSH cryptographic network protocol, identified as CVE-2023-48795. Known as the Terrapin...
Sberbank, a major Russian financial institution, recently disclosed that it encountered an exceptionally potent distributed denial of service (DDoS) attack, marking it as the most formidable in recent history, according...
A campaign known as “Stayin’ Alive” has been actively targeting government organizations and telecommunication service providers across Asia since 2021. Aim of the attack Employing a diverse array of “disposable”...