Case Studies
Critical Docker Engine Flaw Allows Attackers to Bypass Authorization Plugins
Docker is warning of a critical flaw impacting certain versions of Docker Engine that could allow an attacker to sidestep
CISA Warns of Exploitable Vulnerabilities in Popular BIND 9 DNS Software
The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (BIND)
New Chrome Feature Scans Password-Protected Files for Malicious Content
Google said it’s adding new security warnings when downloading potentially suspicious and malicious files via its Chrome web browser. “We
6 Types of Applications Security Testing You Must Know About
While the specifics for security testing vary for applications, web applications, and APIs, a holistic and proactive applications security strategy
Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams
Meta Platforms on Wednesday said it took steps to remove around 63,000 Instagram accounts in Nigeria that were found to
Webinar: Securing the Modern Workspace: What Enterprises MUST Know about Enterprise Browser Security
The browser is the nerve center of the modern workspace. Ironically, however, the browser is also one of the least
Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform
Cybersecurity researchers have disclosed a privilege escalation vulnerability impacting Google Cloud Platform’s Cloud Functions service that an attacker could exploit
Infosec Analyst Jobs: Six-Figure Salaries
This week in cybersecurity from the editors at Cybercrime Magazine –Read the Full Story in Fortune Sausalito, Calif. – Jul.
Deep Dive: Unveiling the Untold Challenges of Single Sign-On (SSO) Management
Single Sign-On (SSO) serves as the linchpin connecting corporate networks, facilitating seamless access to various web applications without the need
North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks
A North Korea-linked threat actor known for its cyber espionage operations has gradually expanded into financially-motivated attacks that involve the
Changing the Passive to Active: Updating SaaS Cybersecurity Strategy with Threat Management
The massive Snowflake breach disclosed recently, involving hundreds of millions of stolen customer records, is a stark wake-up call for
Critical Flaw in Telerik Report Server Poses Remote Code Execution Risk
Progress Software is urging users to update their Telerik Report Server instances following the discovery of a critical security flaw