Critical PHP Vulnerability Under Mass Exploitation Worldwide

https://www.bleepingcomputer.com/news/security/critical-php-rce-vulnerability-mass-exploited-in-new-attacks A critical PHP remote code execution vulnerability, CVE-2024-4577, is being actively exploited in widespread attacks targeting Windows systems globally. The...

Google Introduces AI Scam Detection for Android

https://security.googleblog.com/2025/03/new-ai-powered-scam-detection-features.html Google has launched AI-powered scam detection features for Android devices, designed to protect users from conversational fraud. These features target scams that start innocently but...

Code Security Remains Crucial, Even in Hardened Environments

https://www.sonarsource.com/blog/why-code-security-matters-even-in-hardened-environments A recent study demonstrates that even in hardened environments with read-only file systems, attackers can exploit file write vulnerabilities in Node.js applications to achieve...

Malicious PyPi Package Pirating Deezer Music for Years

https://socket.dev/blog/malicious-pypi-package-exploits-deezer-api-for-coordinated-music-piracy A PyPi package named ‘automslc,’ downloaded over 100,000 times since 2019, has been pirating music from the Deezer streaming service using hardcoded...
Security Culture by Design

Security Culture by Design

Let’s tackle something more fundamental: how to build security into your organization’s DNA. We’re talking about creating a security culture by design. Because here’s the truth – you can have the best tools, the strongest policies, and the most...