The Problem of Permissions and Non-Human Identities
According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported…
Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites
Nov 18, 2024Ravie LakshmananVulnerability / Website Security A critical authentication bypass vulnerability…
How AI Is Transforming IAM and Identity Security
In recent years, artificial intelligence (AI) has begun revolutionizing Identity Access Management…
Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia
Nov 15, 2024Ravie LakshmananMalware / Credential Theft A Vietnamese-speaking threat actor has…
Dive Deep into Crypto Agility and Certificate Management
Nov 15, 2024The Hacker NewsWebinar / Cyber Security In the fast-paced digital…
DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials
A threat actor known as BrazenBamboo has exploited an unresolved security flaw…
Researchers Warn of Privilege Escalation Risks in Google’s Vertex AI ML Platform
Nov 15, 2024Ravie LakshmananArtificial Intelligence / Vulnerability Cybersecurity researchers have disclosed two…
CISA Flags Two Actively Exploited Palo Alto Flaws; New RCE Attack Confirmed
Nov 15, 2024Ravie LakshmananNetwork Security / Vulnerability The U.S. Cybersecurity and Infrastructure…
Experts Uncover 70,000 Hijacked Domains in Widespread ‘Sitting Ducks’ Attack Scheme
Multiple threat actors have been found taking advantage of an attack technique…


