Topic: security reporting

  • New LinkedIn Phishing Scam: The Comment-Reply Tactic

    New LinkedIn Phishing Scam: The Comment-Reply Tactic

    A sophisticated phishing campaign targets LinkedIn users via deceptive comments that impersonate official notifications, pressuring recipients with false policy violation claims to click malicious links, sometimes disguised using LinkedIn's own URL shortener. The scam uses fake LinkedIn-themed pa...

    Read More »
  • Your Car's Browser Is a Cyber Risk

    Your Car's Browser Is a Cyber Risk

    Integrated browsers in devices like cars and smart TVs are often unpatched for years, creating significant security vulnerabilities and enabling phishing attacks. A study using crowdsourced testing found many newly released devices contain browsers several years out of date, with manufacturers fr...

    Read More »
  • Zscaler Boosts AI Security with Enhanced Visibility and Control

    Zscaler Boosts AI Security with Enhanced Visibility and Control

    Businesses are rapidly adopting AI, but this creates new security vulnerabilities as traditional cybersecurity tools fail to protect AI systems' unique traffic and protocols. A major challenge is "shadow AI," where companies lack a complete inventory of their AI assets, creating blind spots that ...

    Read More »
  • 35 Must-Have Open-Source Security Tools for Red Teams & SOCs

    35 Must-Have Open-Source Security Tools for Red Teams & SOCs

    The article highlights 35 essential open-source security tools for various domains like cloud security, threat hunting, and vulnerability management, aiding red teams and SOC analysts. Key tools include Autorize for authorization testing, BadDNS for DNS security, and Beelzebub for...

    Read More »