Blog

Displaying items by tag: ThreatIntelligence

In an urgent reminder of the ever-evolving cybersecurity threat landscape, Samsung has issued an emergency security update to address CVE-2025-4632, a critical zero-day vulnerability actively exploited in the wild. This isn't a routine patch—it’s a significant alert for enterprises, CISOs, and mobile users worldwide. Over 2 billion Samsung devices are potentially exposed, raising an immediate and critical question

Published in Others

Cybersecurity professionals have long warned that the biggest threats to enterprise security are not necessarily the most complex. Often, it's the unpatched, overlooked, or misunderstood vulnerabilities that open the door to devastating breaches. This truth was once again proven with the discovery of CVE-2025-32756, a critical zero-day vulnerability affecting Fortinet’s FortiOS, the backbone of its widely deployed firewall and networking solutions.

Published in Others

In today’s digital-first world, convenience often comes at the cost of privacy. Every click, voice command, and facial scan contributes to a growing ecosystem of personal data. While users place trust in technology providers to safeguard their digital identities, recent events reveal that this trust is not always upheld.

Published in Others

Imagine paying just €10 to knock an entire website offline.
No hacking knowledge required. No secret chatrooms. Just a simple, user-friendly web portal.
This wasn’t fiction—it was the reality of the growing DDoS-for-hire underworld.

Published in Others

Open-source software has radically transformed how modern applications are built. It accelerates development, reduces costs, and fosters innovation. But in this era of rapid development and microservices, it also introduces a silent but significant threat: your dependencies. 

Published in Others

Imagine installing a plugin to protect your website—only to discover it’s the very reason your data has been compromised. That’s the disturbing reality facing more than 1,100 WordPress websites, all of which fell victim to a fake security plugin that promised protection while quietly enabling a full-scale breach.

Published in Others

The Karnataka High Court has recently taken a decisive step in the ongoing global debate over encrypted communication and digital freedom. In a directive issued under Section 69A of the Information Technology Act, the court ordered the Government of India to block access to Proton Mail—a Swiss-based encrypted email service known for its end-to-end security and zero-access architecture.

Published in Others

Cybersecurity is a battle that never stops, and as new threats emerge, so must our defenses. Today, two critical vulnerabilities—CVE-2025-1976 (Broadcom Brocade) and CVE-2025-3928 (Commvault)—are actively exploited in the wild. These flaws, added recently to the U.S. Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities (KEV) catalog, put countless organizations at immediate risk. In this post, we break down these vulnerabilities, the potential risks they pose, and what you must do to stay protected.

Published in Others

In the past 90 days alone, security teams have detected a 217% surge in cloud-based attacks targeting educational institutions. The latest threat actor making headlines? Storm-1977 - and their sophisticated techniques are bypassing traditional security measures at an alarming rate.

Published in Others
Page 3 of 3

Information

digiALERT is a rapidly growing new-age premium cyber security services firm. We are also the trusted cyber security partner for more than 500+ enterprises across the globe. We are headquartered in India, with offices in Santa Clara, Sacremento , Colombo , Kathmandu, etc. We firmly believe as a company, you focus on your core area, while we focus on our core area which is to take care of your cyber security needs.