Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Beware: Malvertising Campaign Hits Nearly a Million Devices

Microsoft warns that a widespread malvertising campaign hit nearly one million devices around the world. The campaign, which began on illegal streaming sites, impacted both consumer and enterprise devices across a wide range of industries. “Analysis of the redirector chain determined the attack likely originated from illegal streaming websites where users can watch pirated videos,” Microsoft says.

How Sedara ASM Transforms Cybersecurity for Your Business

Cybersecurity has advanced beyond the reliance on firewalls and antivirus software. As cyber threats become more sophisticated and unpredictable, traditional security tools alone are no longer enough. Modern attacks exploit unknown, unmanaged, and overlooked assets, making Attack Surface Management (ASM) essential for a proactive and comprehensive defense.

2025 is Cloud Security's Breakthrough Year

Sysdig’s 2025 Cloud-Native Security and Usage Report identifies promising trends in how organizations are developing, using, and maintaining everything within their cloud environments. The eighth annual report shares the results of an analysis of millions of containers and cloud accounts. This year’s findings reveal several key areas that have improved, including cloud threat detection and response, AI security, and vulnerability management.

Exploited! Apache Tomcat Path Equivalence Vulnerability (CVE-2025-24813)

Apache Tomcat recently disclosed a critical security vulnerability, CVE-2025-24813, affecting several versions of its widely used servlet container. This vulnerability arises from improper handling of path equivalence checks involving filenames with internal dots (file…txt). Exploitation could result in unauthorized information disclosure, file manipulation, and even remote code execution (RCE).

The Mike Tyson Approach to Cybersecurity: Beyond Prevention

Everyone has a plan until they get punched in the face - and cyberattacks are that punch. While traditional security focuses on prevention, true resilience comes from how you respond and recover. Learn why organizations must build better infrastructure, processes, and talent post-breach instead of rushing back to normal operations. The human toll of attacks is real, but avoiding post-incident reflection is the biggest mistake you can make.

Scared or Ready: A Pragmatic Way to Approach Security Threats

Security incidents are often making headlines, from ransomware to colossal data leaks. On top of that, making informed security decisions is a challenge in itself, requiring knowledge across product requirements, complex distributed systems, code, architecture, and security. All of which creates a sense of fear, uncertainty, and doubt for those of us who build software. How can we better prepare to respond to potential threats and gain confidence in our security incident response readiness?

10 Privileged Access Management Best Practices

Privileged access management (PAM) is the cornerstone of data security and operational efficiency. A well-structured PAM strategy not only reduces the risk of security threats but also enhances IT processes and productivity in an organization. However, implementing an effective PAM strategy requires a comprehensive approach.

Is TensorFlow Keras "Safe Mode" Actually Safe? Bypassing safe_mode Mitigation to Achieve Arbitrary Code Execution

Update: This issue was discovered and disclosed independently to Keras by JFrog’s research team and Peng Zhou. Machine learning frameworks often rely on serialization and deserialization mechanisms to store and load models. However, improper code isolation and executable components in the models can lead to severe security risks. The structure of the Keras v3 ML Model in TensorFlow.