Topic: legacy vulnerabilities
-
Automated Network Pentesting Reveals Hidden Vulnerabilities
Annual network penetration tests are insufficient against daily evolving threats, making continuous security validation essential for modern defense. Common vulnerabilities include spoofing attacks via default protocols and persistent issues like unpatched systems and misconfigurations across all...
Read More » -
Phishing-Resistant Authentication: How Hackers Still Bypass It
Phishing-resistant authentication methods like passkeys and FIDO2-based systems (e.g., YubiKeys) improve security, but attackers exploit weaknesses such as downgrade attacks to bypass them. Emerging threats like device code phishing, consent phishing, and verification phishing target vulnerabilit...
Read More » -
Cisco Hackers Use SNMP Flaw to Install Rootkit on Switches
Cybersecurity experts warn of a serious threat exploiting a recently patched remote code execution vulnerability (CVE-2025-20352) in Cisco networking hardware, allowing attackers with root access to install persistent rootkits. The campaign, named 'Operation Zero Disco', targets Cisco switches li...
Read More »