The Hidden Security Gaps in Your SaaS Apps: Are You Doing Due Diligence?
SaaS applications have become indispensable for organizations aiming to enhance productivity and streamline operations. However, the convenience and efficiency these…
Identity illuminated
SaaS applications have become indispensable for organizations aiming to enhance productivity and streamline operations. However, the convenience and efficiency these…
The Open-Source Software Prevalence Initiative, announced at DEF CON, will examine how open source software is used in critical infrastructure.…
The press is reporting a critical Windows vulnerability affecting IPv6. As Microsoft explained in its Tuesday advisory, unauthenticated attackers can…
Cybersecurity researchers have uncovered new stealer malware that’s designed to specifically target Apple macOS systems. Dubbed Banshee Stealer, it’s offered…
A large percentage of Google’s own Pixel devices shipped globally since September 2017 included dormant software that could be used…
A great many readers this month reported receiving alerts that their Social Security Number, name, address and other personal information…
The attack affects organizations that have synced multiple on-premises Active Directory domains to a single Azure tenant. The attack affects…
The vulnerability was given a high-severity CVSS score, indicating that customers should act swiftly to mitigate the flaw. The vulnerability…
The threat group tracked as APT42 remains on the warpath with various phishing and other social engineering campaigns, as tensions…
From the Federal Register: After three rounds of evaluation and analysis, NIST selected four algorithms it will standardize as a…