Microsoft announced a new update to Defender for Office 365 that automatically detects and blocks email bombing attacks. The rollout started in June, and most users will receive the feature by mid-July 2025.
Cloudflare reported that it stopped the most powerful UDP flood DDoS attack aimed at exhausting system resources. In 35 seconds, the attackers flooded the company with traffic at 11.5 Tbit/s.
Did you know that an ordinary calendar can become a tool for a hacker attack? Google researchers discovered that the hacker group APT41 is using Google Calendar to send commands to infected systems.
Among internet users, a long-standing myth has taken hold: if a website has the HTTPS mark - that is, a padlock in the address bar and the letter S after “http” - it means the resource is safe and trustworthy. But in reality, the situation is much more co
Penetration test definition and types. The key steps penetration testers take during different pentestings and how it helps companies improve their overall cybersecurity resilience
Every year, companies are increasingly integrating automated tools into their cybersecurity processes. Automation is just one auxiliary tool that comes with both advantages and disadvantages that must be kept in mind.
Metasploit is known for everyone interested in cybersecurity. It is not just a framework but a key driver of ethical hacking and pentesting, becoming the standard for thousands of professionals.
More than 40 fraudulent programs have been identified in the Mozilla Firefox browser. These extensions mimic legitimate wallet tools from popular platforms. The large-scale campaign has been ongoing since April 2025.