SN-Blackmeta exploited outdated Zendesk tokens at Internet Archive. See what happened and how to avoid similar breaches.
A cyberattack hit Halliburton’s Houston HQ—see what went wrong and how to prevent similar threats in your org.
Hackers are exploiting Redis servers to deploy ransomware and crypto miners. Learn how to protect your infrastructure.
Learn how a misconfigured Apache server exposes users to XSS attacks and what steps to take to stay secure.
A flaw in Defender Security <4.1.0 lets attackers bypass the hidden login page. Learn how this WordPress plugin vulnerability works—and how to fix it.
CVE-2019-11248 exposed debug endpoints in Kubernetes, creating serious security risks. Learn how this vulnerability works, its impact, and how to defend your clusters.