Dia’s Paid Plan Marks New Phase in AI-Powered Web Browsing

Dia, an AI-powered browser from The Browser Company, launches a $20 Pro plan billed as “unlimited” AI access, but subject to Terms that can curb heavy use. Read more »

WinRAR zero day exploited by RomCom hackers in targeted attacks

ESET researchers have discovered a previously unknown vulnerability in WinRAR, exploited in the wild by Russia-aligned group RomCom. If you use WinRAR or related components such as the Windows... Read more »

Open-source server management platform Proxmox VE 9.0 released

Proxmox Virtual Environment (VE) 9.0 introduces advancements in both storage and networking capabilities, addressing critical enterprise demands. A highlight is the long-awaited support for snapshots on thick-provisioned LVM shared... Read more »

Attackers Use Proofpoint and Intermedia Link Wrapping to Hide Malicious URLs

Layers of link wrapping hide malicious URLs used for phishing. Learn how to protect against link wrapping attacks. Read more »

BloodHound 8.0 debuts with major upgrades in attack path management

SpecterOps has released BloodHound 8.0, the latest iteration of its open-source attack path management platform, featuring major enhancements and expanded capabilities. BloodHound OpenGraph The release introduces BloodHound OpenGraph, a... Read more »

Microsoft Used China-Based Engineers to Maintain Vulnerable SharePoint

The application was exploited by at least three state-sponsored Chinese threat groups last month. Read more »

Open-source password recovery utility Hashcat 7.0.0 released

Hashcat is an open-source password recovery tool that supports five attack modes and more than 300 highly optimized hashing algorithms. It runs on CPUs, GPUs, and other hardware accelerators... Read more »

Microsoft Authenticator Users: Your Passwords Could Be Inaccessible Soon – Act By Aug. 1

If you use Microsoft Authenticator, there are important steps you might want to take this month when it comes to password management. Get the details. Read more »

Artemis: Open-source modular vulnerability scanner

Artemis is an open-source modular vulnerability scanner that checks different aspects of a website’s security and translates the results into easy-to-understand messages that can be shared with the organizations... Read more »

Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities

Vulnhuntr is an open-source tool that finds remotely exploitable vulnerabilities. It uses LLMs and static code analysis to trace how data moves through an application, from user input to... Read more »
Subscribe to our Newsletter