Attackers are using an 8-year-old version of the Redis open-source database server to maliciously use Metasploit's Meterpreter module to expose exploits within a system,...
The authentication mechanism within the Google Kubernetes Engine (GKE) has a loophole that could allow an external attacker with any Google account to access...
The news headlines are full of breaches and data exposures that are the result of unsecured cloud-native applications and application programming interfaces (APIs) —...
COMMENTARYIn recent years, Australia has made some key moves to improve the country's security posture. In 2020, the country invested AUD $1.67 billion (US$1.1...
Business Security By eliminating these mistakes and blind spots, your organization can take massive strides towards optimizing its use of cloud without exposing...
A threat actor is targeting a common misconfiguration in Hadoop YARN and Apache Flink to try and drop Monero cyrptominers in environments running the...
PRESS RELEASEMOUNTAIN VIEW, CA – January 3, 2024 – SentinelOne (NYSE: S), a global leader in AI-powered security, today announced that it has agreed to acquire...
COMMENTARYWhile distributed denial-of-service (DDoS) attacks and zero-day threats are nothing new in cybersecurity, they're still happening regularly for a simple reason: They work. In...
Digital Security As we draw the curtain on another eventful year in cybersecurity, let’s review some of the high-profile cyber-incidents that occurred in...