The Secret Weakness Execs Are Overlooking: Non-Human Identities
For years, securing a company's systems was synonymous with securing its "perimeter."…
Critical flaw in NVIDIA Container Toolkit allows full host takeover
A critical vulnerability in NVIDIA Container Toolkit impacts all AI applications in…
Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks
The threat actor known as Storm-0501 has targeted government, manufacturing, transportation, and…
Critical NVIDIA Container Toolkit Vulnerability Could Grant Full Host Access to Attackers
Sep 27, 2024Ravie LakshmananContainer Security / Cloud Computing A critical security flaw…
Critical Ivanti Cloud Appliance Vulnerability Exploited in Active Cyberattacks
Sep 20, 2024Ravie LakshmananEnterprise Security / Network Security Ivanti has revealed that…
The Future of (Privileged) Access Management
In IT environments, some secrets are managed well and some fly under…
Google Fixes GCP Composer Flaw That Could’ve Led to Remote Code Execution
Sep 16, 2024Ravie LakshmananCloud Security / Vulnerability A now-patched critical security flaw…
GitLab Patches Critical Flaw Allowing Unauthorized Pipeline Job Execution
Sep 12, 2024Ravie LakshmananDevSecOps / Vulnerability GitLab on Wednesday released security updates…
17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London
Sep 13, 2024Ravie LakshmananCyber Attack / Crime British authorities on Thursday announced…