CVE-2025-8941: Critical privilege escalation in Linux-PAM The CVE-2025-8941 vulnerability affecting the Linux-PAM pam_namespace module was published. The issue allows local…
Piscium Security participated in Pwned 2025, Costa Rica’s premier cybersecurity event, achieving first place in the CTF Challenge and strengthening…
News of the Week: Storm of vulnerabilities In the news of the week ending October 10, 2025, are five major…
In a world increasingly dependent on cloud computing, audits have become an essential component of ensuring security, privacy and compliance.…
In today’s digital world, data is the most valuable asset of any organization. Protecting information is critical in any system,…
Introduction The System of Operational Research Activities (SORM) represents one of the most sophisticated and controversial digital surveillance tools available…
The cybersecurity landscape is constantly evolving, and cybercriminals are developing increasingly sophisticated techniques to bypass protective barriers. This time, a…
Cybersecurity is the practice of protecting systems, networks, applications and data from cyber threats. Organizations implement cybersecurity to safeguard their…
The KISS (keep it simple, stupid or keep it stxpid simple) principle encourages designers, developers, and engineers to prioritize simplicity…
The DEV#POPPER campaign continues to evolve, with North Korean threat actors now deploying malware that targets developers across Linux, Windows,…