Topic: legacy vulnerabilities
-
Identity: The Leading Cloud Security Threat
Identity-related weaknesses and outdated vulnerabilities are the main causes of the rise in cloud security incidents, with attackers exploiting these gaps to access sensitive systems and data. Excessive permissions and over-privileged cloud identities, affecting 99% of cases, allow attackers to m...
Read More » -
Cisco Hackers Use SNMP Flaw to Install Rootkit on Switches
Cybersecurity experts warn of a serious threat exploiting a recently patched remote code execution vulnerability (CVE-2025-20352) in Cisco networking hardware, allowing attackers with root access to install persistent rootkits. The campaign, named 'Operation Zero Disco', targets Cisco switches li...
Read More » -
Automated Network Pentesting Reveals Hidden Vulnerabilities
Annual network penetration tests are insufficient against daily evolving threats, making continuous security validation essential for modern defense. Common vulnerabilities include spoofing attacks via default protocols and persistent issues like unpatched systems and misconfigurations across all...
Read More » -
Phishing-Resistant Authentication: How Hackers Still Bypass It
Phishing-resistant authentication methods like passkeys and FIDO2-based systems (e.g., YubiKeys) improve security, but attackers exploit weaknesses such as downgrade attacks to bypass them. Emerging threats like device code phishing, consent phishing, and verification phishing target vulnerabilit...
Read More »