Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

LDAPNightmare: SafeBreach Labs Publishes First Proof-of-Concept Exploit for CVE-2024-49113

SafeBreach Labs Researchers have developed a zero-click PoC exploit that crashes unpatched Windows Servers using the Windows Lightweight Directory Access Protocol (LDAP) remote code execution vulnerability. Active Directory Domain Controllers (DCs) are considered to be one of the crown jewels in organizational computer networks. Vulnerabilities found in DCs are usually much more critical than those found in usual workstations.

What Is Vulnerability Scanning? (Comprehensive Guide)

Vulnerability scanning is the process of assessing web applications, mobile apps, APIs, systems, networks, or cloud infrastructures to identify security weaknesses. It uses automated tools to detect known CVEs (Common Vulnerabilities and Exposures), misconfigurations, and potential attack vectors, helping to secure assets against cyber threats.

The 7 Best Internet Filtering Software of 2025 (Tech Review)

Want to block distracting websites, monitor internet use, and keep your network secure against web-based threats? This list of the best internet filtering software covers website blocking solutions that are suitable for businesses, parental control, Mac users, and more.