It might come as a surprise, but secrets management has become the elephant in the AppSec…
Category: Insights
Adversary-in-the-Middle Attack Campaign Hits Dozens of Global Organizations
Dozens” of organizations across the world have been targeted as part of a broad business email…
Zscaler CEO Jay Chaudhry’s 5 Boldest Statements At Zenith Live 2023
The Zero Trust Shift While it’s undoubtedly the security architecture of the future, zero trust is in direct…
Consolidate Vendors and Products for Better Security
Headquartered in Tokyo, the company has manufacturing facilities in Asia, Europe, and North America, and has…
Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack
Japanese pharmaceutical giant Eisai this week announced that it has fallen victim to a ransomware attack…
Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
A researcher has disclosed the details of serious vulnerabilities discovered in a Honda ecommerce platform used…
Cybercriminals Targeting Apache NiFi Instances for Cryptocurrency Mining
A financially motivated threat actor is actively scouring the internet for unprotected Apache NiFi instances to covertly install…
Critical Firmware Vulnerability in Gigabyte Systems Exposes ~7 Million Devices
Cybersecurity researchers have found “backdoor-like behavior” within Gigabyte systems, which they say enables the UEFI firmware of the…
Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
Point32Health, the second-largest health insurer in Massachusetts, is in the process of informing more than 2.5…
Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
A recently identified ransomware operation called Buhti is using LockBit and Babuk variants to target both…