admin

admin

Cybercriminals Compromise SonicWall Firewall Configurations

Network Firewalls, Network Access Control, Security Operations Compromise of Firewall Configuration Files at SonicWall Akshaya Asokan (asokan_akshaya) • September 19, 2025 Image: Michael Vi/Shutterstock SonicWall is advising customers to reset their credentials following a security breach where hackers obtained backup…

Cyberattack Disrupts Airport Check-In Operations Throughout Europe

On Friday, travelers navigating some of Europe’s busiest airports encountered significant disruptions due to a cyberattack that compromised check-in technology utilized by key facilities. The incident primarily affected systems supplied by Collins Aerospace, a prominent provider of passenger processing solutions,…

Hacktivist Group GhostSec Breaches 55 Berghof PLCs Throughout Israel

Hacktivist Group GhostSec Breaches Israeli PLCs as Part of “Free Palestine” Campaign In a significant cybersecurity incident, the hacktivist collective GhostSec has taken responsibility for compromising approximately 55 Berghof programmable logic controllers (PLCs) employed by various Israeli organizations. This action…

Understanding Attack Surface Management

As digital landscapes evolve, attack surfaces are expanding at a pace that often outstrips the capacity of security teams to manage. To effectively defend against potential breaches, understanding what assets are exposed and identifying vulnerabilities is essential. The surge in…