Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Pernicious Permissions: How Kubernetes Cryptomining Became an AWS Cloud Data Heist

The opportunistic "SCARLETEEL" attack on a firm's Amazon Web Services account turns into targeted data theft after the intruder uses an overpermissioned service to jump into cloud system.

DARKReading
#vulnerability#web#mac#amazon#kubernetes#intel#perl#aws#auth
China's BlackFly Targets Materials Sector in 'Relentless' Quest for IP

Separate attacks on two subsidiaries of an Asian conglomerate reflect a surge of cyber-espionage activity in the region in the last 12 months.

The DoJ Disruption of the Hive Ransomware Group Is a Short-Lived Win

The war on critical infrastructure demands a better security strategy.

Attackers Were on Network for 2 Years, News Corp Says

The publisher of the Wall Street Journal, New York Post, and several other publications had last year disclosed a breach it said was the work of a state-backed actor likely working for China.

Vouched Raises $6.3M to Expand AI Identity Verification Offering to Telemedicine and Healthcare

Vouched now covers more than 85% of the global population, as demand accelerates for its platform to securely automate KYC and KYP compliance to better serve patients and drive revenue.

How to Reduce Code Risk Using Pipelineless Security

The exposure and exploitation of hardcoded secrets continues to drive software supply chain attacks. One solution: zero new hardcoded secrets.

All CVEs Are Not Created Equal

Vulnerabilities impact each industry differently, so each sector needs to think about its defenses and vulnerability management differently.

Palo Alto Announces Zero-Trust Security Solution for OT

New Zero Trust OT Security solution secures critical infrastructure without additional sensors.