Digital Risk Protection

Digital Risk Protection
A newly emerged ransomware group – THE GENTLEMEN RANSOMWARE

A newly emerged ransomware group – THE GENTLEMEN RANSOMWARE

September 11, 2025

Summary The Gentlemen ransomware represents a sophisticated, highly adaptive threat…

Salesloft Takes Drift Offline Following OAuth Token Theft Impacting Hundreds of Organizations - iZoologic

Salesloft Takes Drift Offline Following OAuth Token Theft Impacting Hundreds of Organizations

September 2, 2025

Executive Summary Salesloft has taken Drift fully offline following a…

Output Messenger Flaw Zero Day Cyberattack Hackers Microsoft

Hackers exploit an Output Messenger flaw for zero-day attacks

June 10, 2025

A Turkey-backed cyberespionage group took advantage of a zero-day vulnerability…

Defendnot Tool Microsoft Defender Windows Devices Hackers

The new Defendnot tool can disable the Microsoft Defender

June 6, 2025

A recently developed tool named Defendnot can allegedly disable Microsoft…

CVE Database Common Vulnerabilities And Exposures US CISA

Crisis in CVE database program averted with temporary US support

April 17, 2025

The CVE (Common Vulnerabilities and Exposures) database program, a cornerstone…

Black Basta Ransomware VPN BRUTED Firewalls

Black Basta develops automated VPN brute forcing tool BRUTED

April 8, 2025

The Black Basta ransomware gang created an automated brute-forcing tool…

VPN Devices Brute Force Attack Botnet Hackers Cyberattack

A large-scale brute force attack targets various VPN devices

March 5, 2025

A newly discovered massive brute force attack that employs about…

Vulnerability Assessment Cybersecurity Threat Landscape Security Infrastructure

Vulnerability assessment: Identify gaps

February 21, 2025

Vulnerability assessment has been one of the primary cybersecurity approaches…

Threat Modelling Cybersecurity Cyberdefence Strategy Hackers

Threat modelling cybersecurity explained

January 30, 2025

Threat modelling cybersecurity allows firms to establish a cyber defence…

Nuclei Flaw Hackers Signature Verification Vulnerability Scanner

Hackers could exploit the Nuclei flaw to bypass verification

January 23, 2025

The recently patched Nuclei flaw is an open-source vulnerability scanner…