Comfidentia Blog
Welcome to the Comfidentia blog, where we share knowledge about cybersecurity, technology, and best practices.
Welcome to the Comfidentia blog, where we share knowledge about cybersecurity, technology, and best practices.
Published on November 28, 2025

The digital world offers many opportunities for self-expression and development, but it is also a space where disagreements can escalate quickly, and bullying, harassment and revenge are present. …
Published on November 28, 2025

North Korean threat actors responsible for the “Contagious Interview” campaign have flooded the npm registry with 197 additional malicious packages since last month. According to a Socket …
Published on November 28, 2025

Ontinue security researchers have discovered a “cross-tenant blind spot” in Microsoft Teams that allows attackers to bypass Microsoft Defender for Office 365 protections using the guest …
Published on November 28, 2025

Cybersecurity researchers have discovered vulnerable code in outdated Python packages that could pave the way for a supply chain compromise attack on the Python Package Index (PyPI) via a domain …
Published on November 27, 2025
A default configuration in Mattermost, an open source collaboration platform used by enterprises and government agencies, exposes deployments to critical …