Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers

Cybersecurity researchers have discovered severe cryptographic issues in various end-to-end encrypted (E2EE) cloud storage platforms that…

North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data

North Korean information technology (IT) workers who obtain employment under false identities in Western companies are…

Channel Women In Security: Understanding Risk In Digital Security

In the first episode of Channel Women in Security, Cass Cooper speaks with Rosanna Filingeri, Vice…

Security Flaw in Styra’s OPA Exposes NTLM Hashes to Remote Attackers

Details have emerged about a now-patched security flaw in Styra’s Open Policy Agent (OPA) that, if…

Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks

Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised…

A Comprehensive Guide to Finding Service Accounts in Active Directory

Service accounts are vital in any enterprise, running automated processes like managing applications or scripts. However,…

Microsoft: ‘Relentless’ Russia-Sponsored Hacking Group Has Been Disrupted

Microsoft disclosed details Thursday about a recent effort to disrupt the activities of a “relentless” Russia-linked…

Collapse of National Security Elites’ Cyber Firm Leaves Bitter Wake

The future was once dazzling for IronNet. Founded by a former director of the National Security…

Apple iOS 18.0.1 Patches Password Exposure and Audio Snippet Bugs

Apple has pushed out a security-themed iOS and iPadOS update to fix a pair of flaws…

Savvy CEO: Identity Security Should ‘Fit Where Modern Work And IT’ Are Going

While few workers have ever enjoyed needing to interact with their cybersecurity team over a minor…