Why Your Identity Is the Key to Modernizing Cybersecurity
Ultimately, the goal of creating a trusted environment around all digital assets and devices is about modernizing the way you…
Exclusive insights on cybersecurity
Ultimately, the goal of creating a trusted environment around all digital assets and devices is about modernizing the way you…
Hey there, it’s your weekly dose of “what the heck is going on in cybersecurity land” – and trust me,…
Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet,…
The link between detection and response (DR) practices and cloud security has historically been weak. As global organizations increasingly adopt…
A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to…
Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by…
Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup & Replication to deploy Akira and…
The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel…