Why Your Identity Is the Key to Modernizing Cybersecurity
Ultimately, the goal of creating a trusted environment around all digital assets and devices is about modernizing the way you…
Cyber Facts You Didn't Know
Ultimately, the goal of creating a trusted environment around all digital assets and devices is about modernizing the way you…
Hey there, it’s your weekly dose of “what the heck is going on in cybersecurity land” – and trust me,…
Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet,…
The link between detection and response (DR) practices and cloud security has historically been weak. As global organizations increasingly adopt…
A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to…
Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by…
Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup & Replication to deploy Akira and…
The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel…
The U.S. Department of Justice (DoJ) has announced arrests and charges against several individuals and entities in connection with allegedly…
Companies are putting “AI” in just about all of their products, which opens up new security holes. LLM SecOps and…