Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization

The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments — a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. Larger scale leads to larger risk. As organizations increase their quantity of cloud assets, their attack surface grows. Each asset brings its own set of security concerns.

Important Features Your ASM Tool Must Have - Part 2

In part 1 of this series, we covered a lot of ground including the three converging trends that point to the need for an attack surface management (ASM) solution – the growing attack surface, attackers having more opportunities and tools to infiltrate the attack surface, and manual SecOps being slow and ineffective. We also outlined the key features you should be looking for when selecting an ASM tool.

What is Privilege Escalation in AWS? Recommendations to Prevent the Risk of Privilege Escalation on AWS

Privilege escalation in AWS refers to the unauthorized elevation of user privileges within the AWS environment, allowing users to access resources and perform actions beyond their intended level of permissions. This security risk would arise in case the attackers utilize the vulnerabilities or misconfigurations in AWS services, IAM policies, or access controls to take up privileges above the current level.

Securing the Factory of the Future: How ZTNA and SSE Empower Manufacturing

The manufacturing landscape is undergoing a digital revolution, driven significantly by Industrial IoT (IIoT), cloud adoption, and remote access needs. These advancements enable manufacturing companies to unlock efficiency gains, optimize operations, and enhance collaboration, but they also introduce a raft of new cybersecurity challenges. Legacy equipment and complex network setups have always made it difficult to secure manufacturing environments.

The Application Security Assessment Checklist for Cloud Native Environments

A cloud-based application security assessment (or ASA) is a systematic evaluation to identify vulnerabilities and improve security in cloud applications. It aims to ensure the application’s structural, design, and operational integrity against all cyber threats. A staggering 82% of data breaches in 2023 involved data stored in the cloud.

Device Authority Appoints Former Google and Vodafone Product Manager To Drive Its Product Led Growth Strategy

Device Authority, an award-winning and recognized global leader in Identity and Access Management (IAM) for Enterprise IoT ecosystems has appointed Richard Seward as Vice President of Product Management to drive forward the company’s growing portfolio of innovative products under its KeyScaler platform.

FBI Warns US Retailers That Cybercriminals Are Targeting Their Gift Card Systems

The FBI has issued a warning to US retailers about a financially-motivated malicious hacking ring that has been targeting employees with phishing attacks in an attempt to create fraudulent gift cards. Staff at the corporate offices of US retail companies have been the target of highly-sophisticated email phishing and SMS phishing ("smishing") attacks. These attacks attempt to gain access to employee accounts, IT systems, and cloud services used by the company.

Unauthenticated Out-of-Bounds Memory Read Vulnerability in Citrix NetScaler ADC and Gateway

On May 6, 2024, Bishop Fox publicly disclosed a vulnerability along with a proof of concept (PoC) exploit in Citrix NetScaler ADC and Gateway, identified as an unauthenticated out-of-bounds memory read issue in the components used for Authentication, Authorization, and Auditing (AAA).

Strengthening ANZ's Critical Infrastructure Sectors Against Cyber Threats in 2024

As 2024 continues forward, Australia and New Zealand’s critical infrastructure sectors face significant cybersecurity challenges. Critical infrastructure (CI) sectors–encompassing energy, healthcare, transportation, water, and communication–are at a pivotal moment in their evolution. The rapid digitisation of these sectors brings not only unprecedented efficiency and connectivity but also a significantly expanded attack surface.

Getting Started with Software Dependency Management

Dependency management is a broad topic encompassing, among other things, keeping an inventory of dependencies, removing unused dependencies, and fixing conflicts between dependencies. In this article, we will focus on one large part of software dependency management that devs can do easily and with great results: updating dependencies.