07 May, 2025 | Editorial Team
SentinelOne Bypassed. Again. The Cybersecurity Industry Must Wake Up.

We’re here again. Another major vendor bypassed. This time? SentinelOne. A new exploit has...

Xcitium Partners with Telarus to Strengthen Cybersecurity Solutions
15 Nov, 2023 | Editorial Team
Xcitium Partners with Telarus to Strengthen Cybersecurity Solutions

  Xcitium earns top innovator and security awards for its state-of-the-art endpoint protection...

Super Micro Trojan Compromises The Servers Of Tech Giants Apple And Amazon
11 Oct, 2022 | Editorial Team
Super Micro Trojan Compromises The Servers Of Tech Giants Apple And Amazon

The Chinese cyber spies have infected the servers used by over 30 US companies that includes...

What Is Computer Vulnerability?
11 Oct, 2022 | Editorial Team
What Is Computer Vulnerability?

A computer vulnerability is a cybersecurity term that refers to a defect in a system that can leave...

What Is The MITRE ATTACK Framework?
11 Oct, 2022 | Editorial Team
What Is The MITRE ATTACK Framework?

How prepared are you for security incidents? Does your cyber defense system work effectively? Do...

Internet Security Including CAV and Firewall
11 Oct, 2022 | Editorial Team
Internet Security Including CAV and Firewall

At Xcitium, we have released updates today to Xcitium Internet Security (CIS), which also contains...