IPFire's 200th Core Update introduces a major Linux kernel upgrade, a new domain blocklist service in beta, and critical security…
Read More »DNS
Entity category: technology
The UK has dramatically improved public sector cybersecurity, reducing critical vulnerability backlogs by 75% and cutting cyber-attack fix times by…
Read More »Google's crawler ignores browser performance hints like `preload` and `preconnect` because it operates on Google's high-speed network, making these irrelevant…
Read More »BlueCat Horizon is a unified SaaS platform that integrates DNS, DHCP, IPAM, and security to provide consistent governance and real-time…
Read More »Portmaster is a free, open-source application firewall for Windows and Linux that provides granular control over network traffic to enhance…
Read More »Content creators have faced unauthorized use of their work by AI models, with few existing mechanisms to protect intellectual property…
Read More »The China-linked hacking group PlushDaemon hijacks legitimate software update channels to deploy custom malware in global cyberespionage campaigns, targeting entities…
Read More »A widespread outage at Cloudflare disrupted major websites and services like X, ChatGPT, and Spotify, highlighting the internet's heavy reliance…
Read More »A major Cloudflare outage disrupted numerous popular websites and services, including ChatGPT, revealing the heavy reliance many platforms have on…
Read More »Verifying cloud-hosted assets in Google Search Console is essential for SEO oversight, allowing monitoring of performance and access to debugging…
Read More »Atroposia is a malware-as-a-service platform offering a modular remote access trojan for $200 per month, featuring stealthy remote control, data…
Read More »A massive global disruption of Amazon Web Services was caused by a single point of failure in its cloud infrastructure,…
Read More »The Universe Browser, marketed as a privacy tool, secretly routes user data through Chinese servers and installs malware-like programs, including…
Read More »Cybersecurity risk has expanded beyond IT to include operational technology, IoT devices, and supply chains, requiring strategies like visibility and…
Read More »Outdated Windows protocols like LLMNR and NBT-NS pose a security threat by allowing credential theft through inherent design flaws, not…
Read More »The Detour Dog malware campaign has infected over 30,000 websites, using DNS TXT records for server-side attacks that remain hidden…
Read More »Mis-issued TLS certificates for Cloudflare's 1.1.1.1 service raised security concerns, potentially allowing interception and manipulation of encrypted DNS traffic. Cloudflare…
Read More »A sophisticated phishing campaign targets industrial and supply chain firms using deceptive "Contact Us" forms and prolonged professional emails to…
Read More »Critical vulnerabilities in WinRAR (CVE-2025-8088) and Microsoft Kerberos (CVE-2025-53779) are being actively exploited, with Russian organizations targeted by the WinRAR…
Read More »Whisper, a Dutch cybersecurity startup, launched a predictive threat-neutralization platform called "God Mode," which analyzes 45+ billion data points for…
Read More »


















