The Secret Weakness Execs Are Overlooking: Non-Human Identities
For years, securing a company's systems was synonymous with securing its "perimeter."…
Over 700,000 DrayTek Routers Exposed to Hacking via 14 New Vulnerabilities
Oct 02, 2024Ravie LakshmananVulnerability / Network Security A little over a dozen…
5 Actionable Steps to Prevent GenAI Data Leaks Without Fully Blocking AI Usage
Oct 01, 2024The Hacker NewsGenerative AI / Data Protection Since its emergence,…
Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability
Sep 14, 2024Ravie LakshmananEnterprise Security / Threat Intelligence Ivanti has revealed that…
New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency
Sep 13, 2024Ravie LakshmananEnterprise Security / Vulnerability Cybersecurity researchers have uncovered a…
Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns
Aug 30, 2024Ravie LakshmananCryptojacking / Vulnerability Threat actors are actively exploiting a…
CISA Flags Critical Apache OFBiz Flaw Amid Active Exploitation Reports
Aug 28, 2024Ravie LakshmananSoftware Security / Vulnerability The U.S. Cybersecurity and Infrastructure…
Microsoft Fixes ASCII Smuggling Flaw That Enabled Data Theft from Microsoft 365 Copilot
Aug 27, 2024Ravie LakshmananAI Security / Vulnerability Details have emerged about a…
SonicWall Issues Critical Patch for Firewall Vulnerability Allowing Unauthorized Access
Aug 26, 2024Ravie LakshmananVulnerability / Enterprise Security SonicWall has released security updates…