Here’s a look at the most interesting products from the past month, featuring releases from: 1Password, Bitdefender, Cequence Security, ConnectSecure,...
Threat actors are abusing misconfigured Argo Workflows instances to deploy cryptocurrency miners on Kubernetes (K8s) clusters. Kubernetes is an open-source system that helps to automate the deployment, scaling, and management...
Twitter has revealed in its latest transparency report that only 2.3% of all active accounts have enabled at least one method of two-factor authentication (2FA) between...
Kaseya has received a universal key that will decrypt all of the more than 1,000 businesses and public organizations crippled in the global incident. Kaseya spokeswoman...
More than 1,000 GB of data and over 1.6 million files from dozens of municipalities in the US were left exposed, according to a new report from a team...
Aqua Security released the results of its 2021 Cloud Native Security Survey revealing the knowledge gap around runtime security and the associated risks. The study found that only 3%...
Zero Trust and SASE have become top of mind for many organizations globally in the past year as business models changed overnight to accommodate a remote...
An analysis of the popular Telegram secure messaging protocol has identified four cryptographic vulnerabilities. Although none of the flaws are particularly serious or easy to exploit, security researchers...
Many businesses, agencies, for-profit and non-profit organizations have implemented cybersecurity awareness training programs for their staff. This makes perfect sense given the importance of the last...
Leaders of the Senate Intelligence Committee and other bipartisan lawmakers have formally introduced legislation requiring federal contractors and critical infrastructure groups to report attempted breaches following months...
More than a third of infosec professionals have experienced harassment from their peers, according to a study by a new initiative aiming at tackling the problem....
Recent Comments