How to Address the Expanding Security Risk
Human identities management and control is pretty well done with its set…
Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
A novel attack technique named EchoLeak has been characterized as a "zero-click"…
ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks
Jun 12, 2025Ravie LakshmananVulnerability / Software Security ConnectWise has disclosed that it's…
Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks
Jun 11, 2025Ravie LakshmananRansomware / Cybercrime Former members tied to the Black…
Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps
Jun 10, 2025Ravie LakshmananVulnerability / Cloud Security Adobe on Tuesday pushed security…
Why Non-Human Identity Management is the Next Cybersecurity Frontier
Modern enterprise networks are highly complex environments that rely on hundreds of…
Empower Users and Protect Against GenAI Data Loss
Jun 06, 2025The Hacker NewsArtificial Intelligence / Zero Trust When generative AI…
Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI
Jun 05, 2025Ravie LakshmananNetwork Security / Vulnerability Cisco has released security patches…
Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub
Cybersecurity researchers have discovered a new cryptojacking campaign that's targeting publicly accessible…


