Enabling Good Cybersecurity for Everyone
Automated cybersecurity tools, learning and expert guidance for individuals and companies of all sizes.
Because cybersecurity shouldn't be an enterprise feature.
Automated cybersecurity tools, learning and expert guidance for individuals and companies of all sizes.
Because cybersecurity shouldn't be an enterprise feature.
Checklist of prioritized security actions to keep good security posture.
Review Risks, Take ActionsMonitor which of your systems are visible on the Internet, and lock down before attackers find them.
Start ScanningGet clear and simple advisories for critical vulnerabilities relevant to you.
Get NotificationsLearn secure web development by breaking a vulnerable platform, get a certificate.
Start LearningPublished yesterday
CISA added a high-severity Apache ActiveMQ vulnerability (CVE-2026-34197) to its KEV catalog due to active exploitation that allows attackers to run arbitrary OS commands via the Jolokia API. The flaw is particularly dangerous when chained with CVE-2024-32114, which enables unauthenticated remote code execution in certain versions.
Learn MorePublished today
Mailcow patched three XSS vulnerabilities, including a critical flaw in Autodiscover logs, that allow unauthenticated attackers to take over administrator accounts and exfiltrate sensitive emails. The flaws were fixed in version 2026-03b after researchers demonstrated how to chain them with Login CSRF to steal user data.
Learn MorePublished April 3, 2026
On April 2, 2026, a phishing campaign targeting Balkans-region businesses was identified, using a local language fake invoice email with a spoofed attachment image that links to a malicious JavaScript file hosted on Discord's CDN. The multi-stage infection chain is consistent with a broader Malware-as-a-Service operation documented since late 2025.
Learn MorePublished today
Standard Bank and its subsidiary Liberty suffered a data breach where a threat actor named "Rootboy" claims to have exfiltrated 1.2TB of data from internal administrative systems. The leak includes customer IDs, account numbers, and contact information, though core banking systems remained secure.
Learn MorePublished today
Payouts King ransomware uses QEMU virtual machines to bypass endpoint security and establish hidden backdoors on compromised systems. The campaign exploits vulnerabilities in Citrix and SolarWinds to gain initial access before exfiltrating sensitive Active Directory data.
Learn MoreJoin BeyondMachines platform, use our tools and data to accelerate your security posture
Join our Security Community, connect and discuss with experts facing similar challenges.
You have specific requirements? Schedule a meeting, let's find a solution.