Next.js has rapidly become a dominant force in the React ecosystem, lauded for its developer experience and performance optimizations. However,
News
Offensive
Defensive
Vulnerability

BIAS: Bluetooth Impersonation AttackS
Daniele Antonioli (Postdoc at the EPFL Cyber-Physical Systems Security, Network Security, Wireless Security, Embedded Systems Security, Applied Cryptography, SoCurity) ,
Cyber Espionage

Portuguese NATO documents discovered for sale online
The National Security Office is still determining the extent of the damage, but EMGFA, secret military, and MDN computers are
Geopolitics

Pakistan-Linked APT36 Exploits “Pahalgam Terror Attack” Theme in Multi-Pronged Cyber Espionage Campaign Against India
In a recent and concerning development in the ongoing cyber conflict landscape, the Pakistan-linked Advanced Persistent Threat (APT) group known
Latest Posts

Pakistan-Linked APT36 Exploits “Pahalgam Terror Attack” Theme in Multi-Pronged Cyber Espionage Campaign Against India
In a recent and concerning development in the ongoing cyber conflict landscape, the Pakistan-linked Advanced Persistent Threat (APT) group known
Unpacking CVE-2025-29927: A Deep Dive into the Next.js Path Traversal Vulnerability
Next.js has rapidly become a dominant force in the React ecosystem, lauded for its developer experience and performance optimizations. However,
MITRE ATT&CKcon 5.0: Elevating Cybersecurity Knowledge
Cybersecurity remains at the forefront of the global conversation, and MITRE ATT&CKcon 5.0 is a pivotal event in the field.

A CyberRisk Alliance Resource: MSSP Alert – Top 250 MSSPs Service Providers 2023 Edition
As cyber threats evolve, so do the strategies to combat them. The latest MSSP Alert: Top 250 MSSPs Service Providers