Topic: legacy vulnerabilities

  • Automated Network Pentesting Reveals Hidden Vulnerabilities

    Automated Network Pentesting Reveals Hidden Vulnerabilities

    Annual network penetration tests are insufficient against daily evolving threats, making continuous security validation essential for modern defense. Common vulnerabilities include spoofing attacks via default protocols and persistent issues like unpatched systems and misconfigurations across all...

    Read More »
  • Phishing-Resistant Authentication: How Hackers Still Bypass It

    Phishing-Resistant Authentication: How Hackers Still Bypass It

    Phishing-resistant authentication methods like passkeys and FIDO2-based systems (e.g., YubiKeys) improve security, but attackers exploit weaknesses such as downgrade attacks to bypass them. Emerging threats like device code phishing, consent phishing, and verification phishing target vulnerabilit...

    Read More »
  • Cisco Hackers Use SNMP Flaw to Install Rootkit on Switches

    Cisco Hackers Use SNMP Flaw to Install Rootkit on Switches

    Cybersecurity experts warn of a serious threat exploiting a recently patched remote code execution vulnerability (CVE-2025-20352) in Cisco networking hardware, allowing attackers with root access to install persistent rootkits. The campaign, named 'Operation Zero Disco', targets Cisco switches li...

    Read More »