Category β€” Cyber Attacks

Fortinet attack

Fortinet SSL VPNs Hit by Global Brute-Force Wave

Aug 12, 2025 | Threat Intelligence

Cybersecurity researchers warn of a surge in brute-force traffic aimed at Fortinet SSL VPN devices...

Wing FTP vulnerability

Critical Wing FTP Server Vulnerability Exploited

Jul 11, 2025 | Vulnerability

A recently disclosed flaw in Wing FTP Server is now actively exploited in the wild...

Pay2Key ransomware

Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals

Jul 11, 2025 | Cyber Warfare / Cybercrime

Threat intel shows Pay2Key ransomware has re-emerged with profit-sharing models that incentivize cybercriminal affiliates...

Microsoft Patch Tuesday Updates

Microsoft Patch Tuesday Fixes 5 Zero-Days Exploited in the Wild

Aug 14, 2025 | Vulnerability / Patching

Microsoft's latest security updates address five actively exploited zero-day vulnerabilities affecting Windows and Office products...

Google Cloud cyber attack

Google Cloud Under Siege: Large-Scale DDoS Campaign Targets Global Infrastructure

Aug 10, 2025 | Cloud Security / DDoS

A massive distributed denial-of-service attack disrupted Google Cloud services worldwide, highlighting the rising threat to cloud platforms...

AI-Powered Malware

AI-Powered Malware Learns to Evade Traditional Antivirus Tools

Aug 5, 2025 | Malware / Artificial Intelligence

Security labs have identified a new strain of malware that leverages AI to adapt in real time and bypass endpoint defenses...

APT attack Middle East

New APT Campaign Targets Energy Companies in the Middle East

Aug 2, 2025 | APT / Energy Sector

Nation-state actors are actively exploiting unpatched servers in Middle Eastern energy firms to exfiltrate sensitive operational data...

Social engineering attacks

Social Engineering Surge: 65% of Breaches Now Start with Phishing

Jul 28, 2025 | Social Engineering / Awareness

Industry reports show phishing campaigns remain the most successful initial vector, with attackers deploying increasingly convincing lures...

IoT device hacks

Explosive Growth in IoT Hacks Raises Urgent Security Concerns

Jul 25, 2025 | IoT Security / Cybercrime

Analysts warn of a dramatic increase in IoT-targeted attacks, with smart cameras and routers being the most exploited devices...

Smart Home Breach

Smart Home Devices Under Siege: New Vulnerabilities Discovered

Aug 20, 2025 | IoT Security / Smart Homes

Researchers reveal critical flaws in popular smart home devices, allowing attackers to gain unauthorized access to connected networks and personal data.

Healthcare Cyberattack

Healthcare Sector Hit by Sophisticated Ransomware Campaign

Sep 2, 2025 | Healthcare Security / Ransomware

Hospitals and clinics are targeted by ransomware attacks, forcing temporary shutdowns and raising urgent concerns about patient data safety.

Expert Insights

Howard Silverman

Howard Silverman

VP Marketing - MAZEBOLT

The State of DDoS Defenses: Unpacking a New Survey of 300 CISOs & Security Directors

Sep 22, 2025 Read More
Jean-Philippe Salles

Jean-Philippe Salles

Head of Product - Filigran

Turning Intelligence Into Action with Threat-Informed Defense

Sep 22, 2025 Read More
Alon Levin

Alon Levin

VP Product Management - Seraphic

Taming AI's Threat Vectors: Why CISOs Must Adopt a Secure Enterprise Browser

Sep 15, 2025 Read More
Shahar Ben-Hador

Shahar Ben-Hador

CEO & Co-founder - Radiant

SOC For All: Why Every Company Can Now Afford One

Sep 15, 2025 Read More

Cybersecurity Resources

Resource 1

See our NHI Security Platform in Action

Interactive Tour β†’
Resource 2

Your Roadmap to CTEM Mastery

Download Guide β†’
Resource 3

Cut Through the Chaos. Triage with Confidence.

Download Now β†’
Resource 4

Your Go-to Guide for Fixing Kubernetes Errors

Download Now β†’