Einen weiteren blinden Fleck in Sachen Cloud Security sieht Roy während Fusionen und Übernahmen. Er mahnt…
Category: News
Behind the Mythos hype, Glasswing has just one confirmed CVE
Why is Glasswing still a big deal VulnCheck’s findings reframe Glasswing’s capabilities. The limited number of…
Microsoft’s Windows Recall still allows silent data extraction
“The short-term fix is fairly straightforward. Microsoft could add stronger code integrity and process protections to…
DDoS-Angriffe haben sich verdoppelt
Die Angriffsvolumina stiegen 2025 um den Faktor 5,5 gegenüber 2024. Gcore Radar Angriffsstruktur verändert sich Volumetrische…
AI is breaking traditional security models — Here’s where they fail first
Adopting LLM-based AI-assisted security triage helps accelerate how teams detect, triage and prioritize those vulnerability findings…
6 key trends reshaping the IAM market
“Many enterprises are still in the early stages of deploying passkeys and FIDO2, and biometrics are…
PyPI warns developers after LiteLLM malware found stealing cloud and CI/CD credentials
The disclosure highlighted a common approach that attackers follow these days. Instead of going off immediately…
Trivy supply chain breach compromises over 1,000 SaaS environments, Lapsus$ joins the extortion wave
“Repeated compromises of the same vendor in a short period suggest a persistent weakness,” said Cory…
Chained vulnerabilities in Cisco Catalyst switches could induce denial-of-service
Opswat also discovered two other Catalyst 9300 vulnerabilities: CVE-2026-20112 (cross-site scripting) and CVE-2026-20113 (CRLF injection). These…
New critical Citrix NetScaler hole of similar severity to CitrixBleed2, says expert
As categories, ADCs and VPNs are prime targets for threat actors because they are internet-facing. “Anything…