Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Random but Memorable - Episode 14.5: Triple Hollywood Movie Sabotage with Ralph Echemendia

Why does Hollywood get hacking wrong in so many movies and TV series? In this episode, we invite Ralph Echemendia to share his wild stories of working as a technical supervisor in Hollywood, on award-winning projects like Mr. Robot, Snowden, Savages, and Nerve. We also shine a spotlight on the work Ralph is doing to help the world’s most influential record labels and movie studios protect what they’re working on.

The Essential DLP Checklist for Digital Health and Life Sciences

Security leaders in the life sciences and health technology fields know how important it is to safeguard sensitive data like protected health information (PHI), personally identifiable information (PII), and confidential research data. They also know what’s at stake with a security breach or data exfiltration event. But what’s not always clear is how to find the right solution to keep all that data safe.

Top 10 API Security Testing Tools for Mobile Apps in 2025

According to Salt Security's 2024 State of API Security Report, 80% of API attacks attempt to exploit one or more OWASP API Security Top 10 vulnerabilities. Yet, only 58% of organizations prioritize protection against these well-known threats. This gap leaves many businesses exposed to cyber risks that could have been prevented. Investing in API testing tools helps safeguard your mobile application ecosystem against evolving threats.

Enhancing Cybersecurity in Higher Education: A Shift-Left Approach

Securing a Higher Education Campus remains a significant challenge. There is a direct conflict between the open collaborative nature of our advanced institutes of learning and the perennial need to lock down all sources and targets of cyber threats. For example, in an EDUCAUSE survey, it identified cybersecurity as the number one IT issue for universities in 2024, reflecting the immense pressure on security teams.

Security Bulletin: GitHub Action Supply Chain Attack - reviewdog/action-setup

On March 11, 2025, a supply chain attack targeting the widely used GitHub Action reviewdog/action-setup@v1, leading to the exposure of sensitive CI/CD secrets across multiple repositories. The attack was identified by Wiz Research, which determined that this compromise played a pivotal role in the tj-actions/changed-files incident (Wiz, 2025).

Gee-Wiz! What a $30B Acquisition Means for Cloud Security and AI

The cloud security landscape changed overnight. With Google’s $30B+ acquisition of Wiz, CISOs, security leaders, and multi-cloud teams are left asking: �������� �������������� ��������? What does this acquisition mean for you? How does it impact the pace of innovation, cloud partnerships, and security stacks? What is the future of cloud security, the impact of AI, and where the industry is headed?

Detecting and Mitigating IngressNightmare - CVE-2025-1974

On Monday, March 24, 2025, a set of critical vulnerabilities affecting the admission controller component of the Ingress NGINX Controller for Kubernetes was announced. In total, five vulnerabilities were announced; the most severe vulnerability, CVE-2025-1974 (CVS 9.8), may result in remote code execution (RCE). Exploitation of this vulnerability can be detected with Sysdig Secure or the Falco rule provided in this article.

IngressNightmare: Analysis of Critical Vulnerabilities in Kubernetes Ingress NGINX Controller

On March 24, 2025, Wiz Research disclosed a series of critical vulnerabilities in Ingress NGINX Controller for Kubernetes, collectively dubbed: These unauthenticated Remote Code Execution (RCE) vulnerabilities have been assigned a CVSS base score of 9.8. According to Wiz Research, exploitation allows attackers to gain unauthorized access to all secrets across all namespaces in affected Kubernetes clusters, potentially leading to complete cluster takeover.